US20050220096A1 - Traffic engineering in frame-based carrier networks - Google Patents

Traffic engineering in frame-based carrier networks Download PDF

Info

Publication number
US20050220096A1
US20050220096A1 US10/818,685 US81868504A US2005220096A1 US 20050220096 A1 US20050220096 A1 US 20050220096A1 US 81868504 A US81868504 A US 81868504A US 2005220096 A1 US2005220096 A1 US 2005220096A1
Authority
US
United States
Prior art keywords
network
node
identifier
connections
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/818,685
Inventor
Robert Friskney
Nigel Bragg
Simon Parry
Peter Ashwood-Smith
David Allan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Clearinghouse LLC
Original Assignee
Nortel Networks Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nortel Networks Ltd filed Critical Nortel Networks Ltd
Priority to US10/818,685 priority Critical patent/US20050220096A1/en
Assigned to NORTEL NETWORKS LIMITED reassignment NORTEL NETWORKS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALLAN, DAVID, ASHWOOD-SMITH, PETER
Assigned to NORTEL NETWORKS LIMITED reassignment NORTEL NETWORKS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRAGG, NIGEL, FRISKNEY, ROBERT, PARRY, SIMON
Priority to GB0506972A priority patent/GB2422508B/en
Priority to KR1020067020348A priority patent/KR20070005654A/en
Priority to KR1020137020348A priority patent/KR20130096328A/en
Priority to DE602005017882T priority patent/DE602005017882D1/en
Priority to JP2007506833A priority patent/JP5106100B2/en
Priority to AT05732795T priority patent/ATE450104T1/en
Priority to US10/593,108 priority patent/US8923292B2/en
Priority to GB0716169A priority patent/GB2438767B/en
Priority to CN2005800102574A priority patent/CN1938997B/en
Priority to PCT/GB2005/001332 priority patent/WO2005099183A1/en
Priority to KR1020137021343A priority patent/KR101503629B1/en
Priority to KR1020137021341A priority patent/KR20130100217A/en
Priority to EP05732795A priority patent/EP1735961B1/en
Priority to CA002560702A priority patent/CA2560702A1/en
Publication of US20050220096A1 publication Critical patent/US20050220096A1/en
Priority to US12/196,909 priority patent/US8194668B2/en
Priority to JP2011103244A priority patent/JP5238847B2/en
Assigned to Rockstar Bidco, LP reassignment Rockstar Bidco, LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NORTEL NETWORKS LIMITED
Priority to JP2012223285A priority patent/JP2013009438A/en
Priority to JP2012223284A priority patent/JP2013009437A/en
Priority to US13/683,668 priority patent/US20130176906A1/en
Priority to US13/683,672 priority patent/US8976793B2/en
Assigned to ROCKSTAR CONSORTIUM US LP reassignment ROCKSTAR CONSORTIUM US LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Rockstar Bidco, LP
Priority to JP2013096466A priority patent/JP5544440B2/en
Priority to US14/478,001 priority patent/US9356862B2/en
Assigned to RPX CLEARINGHOUSE LLC reassignment RPX CLEARINGHOUSE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOCKSTAR TECHNOLOGIES LLC, CONSTELLATION TECHNOLOGIES LLC, MOBILESTAR TECHNOLOGIES LLC, NETSTAR TECHNOLOGIES LLC, ROCKSTAR CONSORTIUM LLC, ROCKSTAR CONSORTIUM US LP
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0226Mapping or translating multiple network management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/122Avoiding congestion; Recovering from congestion by diverting traffic away from congested entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/20Support for services
    • H04L49/205Quality of Service based
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0062Provisions for network management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/25Routing or path finding in a switch fabric
    • H04L49/253Routing or path finding in a switch fabric using establishment or release of connections between ports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/25Routing or path finding in a switch fabric
    • H04L49/253Routing or path finding in a switch fabric using establishment or release of connections between ports
    • H04L49/254Centralised controller, i.e. arbitration or scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/35Switches specially adapted for specific applications
    • H04L49/351Switches specially adapted for specific applications for local area network [LAN], e.g. Ethernet switches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/35Switches specially adapted for specific applications
    • H04L49/354Switches specially adapted for specific applications for supporting virtual local area networks [VLAN]

Definitions

  • the present invention relates to methods of, software for and apparatus for enabling traffic engineering in carrier networks.
  • Packet-switched networks such as Internet Protocol (IP) or Ethernet networks are intrinsically connectionless in nature and as a result suffer from Quality of Service (QoS) problems.
  • QoS Quality of Service
  • Carriers may use Multi-Protocol Label Switching (MPLS) over a layer 2 network to create connection-oriented label switched paths (or tunnels) across the intrinsically connectionless network, and thereby to provide guaranteed QoS and bandwidth services to customers.
  • MPLS Multi-Protocol Label Switching
  • MPLS is a relatively unstable standard and carriers desire an alternative.
  • Ethernet switches are used in carrier's networks.
  • Use of Ethernet switches in carrier's networks would have the advantages of interoperability (mappings between Ethernet and other frame/packet/cell data structures such as IP and ATM are well known) and economy (Ethernet switches are relatively inexpensive compared to IP routers, for example).
  • Spanning tree protocols are known which enable a physically meshed Ethernet network to be logically transformed into a simply-connected network by detecting physical loops and logically disabling connections to break up the loops. Spanning tree protocols are also known which are able to detect failure of a physical connection (thereby partitioning the fully-connected network) and automatically restore one or more previously-disabled physical connections so as to re-connect the network. This provides a degree of resiliency. However, carriers are capable of and so desire to plan their network traffic routes to achieve much higher resiliency, flexibility and efficiency than spanning tree can achieve. This routing can most easily be achieved by segregating the traffic into connections whose routes are determined as part of this planning process.
  • FIG. 1 shows a conventional VLAN 10 split up into a plurality of component LANs 12 and connected via VLAN-aware Media Access Control (MAC) bridges 14 .
  • Component LANs 12 are typically provided for different communities of interest, such as users sharing a common server or having common network protocol requirements.
  • Unique identifiers VLAN tags or VLAN IDs are used to identify each component LAN. Broadcast traffic is broadcast only within component LANs. This helps to overcome the scalability issues of the Ethernet by separating the whole VLAN 10 into smaller broadcast domains.
  • VLAN tags are used to distinguish between traffic for different component LANs when forwarding traffic on shared links between MAC bridges.
  • VLAN tags are used as labels to mark traffic at an ingress point of a label switched path (LSP) as belonging to a Layer 2 tunnel, and VLAN-aware Ethernet switches in the network act as a VLAN label switched routers. Connections are formed using one or more LSPs. Intermediate nodes along the connection may optionally swap the inbound label to a different outbound label.
  • LSP label switched path
  • FCS Frame Check Sequence
  • the present invention relates to enabling traffic engineering in frame-based networks such as Ethernet networks.
  • traffic engineering is used broadly in the present document to refer to functions for maintaining the quality of service of the customers' connections while permitting the owner to operate their network efficiently. Examples of this are ensuring that no link is over-loaded, load-balancing the connections evenly across the network, re-equalizing the load on the network by re-routing some existing connections, establishing protection mechanisms, performing traffic restoration actions, and so on.
  • connections are established in the carrier network by configuring, in one or more network nodes, mappings for forwarding data frames such as Ethernet frames.
  • the mappings are from a combination of a) a destination address corresponding to a destination node of a connection, such as a MAC address, and b) an identifier, such as a VLAN tag.
  • the mappings are to selected output ports of the one or more nodes.
  • the mappings enable data frames belonging to different connections to be forwarded differentially (ie forwarded on different output ports) despite the different connections potentially having the same destination node. This enables flexibility in routing connections—eg the ability to perform traffic engineering.
  • the term address is used in this document to denote any means of identifying a network node or an ingress or egress interface of a network node.
  • a method of establishing connections in a frame-based network comprising the step of configuring, in one or more nodes of the network, first mappings for use in forwarding data frames, the first mappings being from a combination of a first destination address corresponding to a first destination node of the network, and a first identifier, the first mappings being to a selected output port of, or to respective selected output ports of each of, the one or more nodes, thereby establishing at least part of a first connection through the one or more nodes to the first destination node.
  • the present invention enables connections to be established in a frame-based network in a highly flexible manner enabling network-wide traffic engineering. Furthermore, the specific problems inherent in the method proposed in draft-kawakami-mpls-lsp-vlan-00.txt (processing overhead and vulnerability of frames to corruption) are overcome since no label swapping is performed.
  • the method of the present invention includes configuring, in at least one of the nodes, a second mapping for use in forwarding data frames, the second mapping being from a combination of: a second destination address corresponding to a second destination node of the network, and a second identifier, the second mapping being to a selected output port of the at least one node, thereby establishing at least part of a second connection through the at least one node to the second destination node, the selected output ports of the at least one node being different for the first and second mappings, thereby enabling, at the at least one node, differential forwarding of data frames associated with the first and second connections.
  • two connections may be established which converge in route at an intermediate node and then diverge again, for example.
  • the first and second destination addresses and the first and second destination nodes are the same.
  • two connections may be established which converge at an intermediate node and then diverge, despite having the same destination node. This enables greater flexibility in setting up connections.
  • the first and second identifiers are the same.
  • two connections may be established which converge at an intermediate node and then diverge, despite using the same identifier.
  • limitations on the number of values identifiers can take do not significantly reduce flexibility in traffic engineering.
  • the network is an Ethernet network and the one or more nodes are Ethernet switches.
  • the identifier is a VLAN tag.
  • this enables traffic engineered carrier networks to be deployed using conventional and relatively inexpensive VLAN-aware Ethernet switches, albeit configured in an entirely novel and inventive manner.
  • the configuration is performed by a control plane of the network.
  • a control plane of the network e.g., carriers have direct control over the establishment of traffic engineering connections in the network.
  • the control plane is ASON/ASTN.
  • a frame-based communications network comprising one or more nodes arranged to perform the method of the first aspect of the present invention set out above is also provided.
  • connection controller for establishing connections in a frame-based network
  • the connection controller comprising: a signal generator capable of generating a first signal for configuring, in a transport node of the network, a first mapping for use in forwarding data frames, the first mapping being from a combination of: a first destination address corresponding to a first destination node of the network, and a first identifier, the first mapping being to a selected output port of the transport node, the first signal thereby establishing at least part of a first connection through the transport node to the first destination node.
  • a method of establishing a connection in a frame-based network comprising the steps of: configuring forwarding information in a plurality of nodes of the network the forwarding information enabling the nodes to forward data frames in dependence on a combination of a destination address and an identifier of the data frames.
  • a method of data traffic engineering in a frame-based network comprising the following steps: establishing a first and second connections in the network passing through a common switching node of the network, configuring the switching node to forward data frames differently in dependence on differences in either a destination address or an identifier of the data frames, thereby enabling data traffic engineering.
  • a method of establishing connections in a frame-based network comprising the step of: configuring, in each of a first plurality of nodes of the network, a first forwarding mapping from a first combination of a destination address and an identifier to a selected output port of a respective node of the first plurality of nodes.
  • connection controller for establishing connections in a frame-based network, the connection controller being arranged to configure a first forwarding mapping in a transport node, the first mapping being from a first combination of a destination address and an identifier to a first output port of the transport node.
  • a method of forwarding data frames in a frame-based network comprising the steps of: establishing a first connection in the network, the first connection being associated with a first combination of a destination address and an identifier, and forwarding data frames in the network in dependence on a combination of a destination address and an identifier of the data frames.
  • FIG. 1 shows a conventional Virtual Bridged LAN
  • FIG. 2 shows an arrangement of Ethernet switches forming a carrier network according to the present invention
  • FIG. 3 shows a control plane/transport plane architecture for controlling the Ethernet carrier network of FIG. 1 according to the present invention
  • FIG. 4 shows the carrier Ethernet network of FIG. 1 arranged to provide connectivity between customer sites according to the present invention
  • FIG. 5 shows how nodes of the control plane interact with Ethernet switches of the transport plane to establish a connection across carrier network according to the present invention
  • FIG. 6 is a flow diagram showing the use of VLAN tag and destination address to differentiate forwarding of data traffic in different connections across the carrier network, according to the present invention
  • FIG. 7 shows an example of differential forwarding for two traffic flows having the same source and destination provider edge nodes but different VLAN tags according to the present invention
  • FIG. 8 shows an example of differential forwarding for two traffic flows having the same source provider edge nodes and VLAN tags but different destination provider edge nodes according to the present invention
  • FIG. 9 shows an example of converged routing for two traffic flows having the same destination provider edge node and VLAN tags but different source provider edge node according to the present invention
  • FIG. 10 shows a sparse mode of broadcast operation for customer VPNs provisioned across a carrier network, according to the present invention.
  • FIG. 11 shows a dense mode of broadcast operation for customer VPNs provisioned across a carrier network, according to the present invention.
  • Embodiments of the present invention are described below by way of example only. These examples represent the best ways of putting the invention into practice that are currently known to the Applicant although they are not the only ways in which this could be achieved.
  • the present invention is primarily concerned with enabling requirements 1) and 2) above in frame-based networks such as Ethernet networks.
  • Requirement 3) may be achieved using conventional mechanisms such as admission control at the ingress nodes of connections (trusted-edge policing).
  • FIG. 2 shows an arrangement of Ethernet switches and communications links forming a carrier network according to the present invention.
  • Carrier network cloud 20 comprises Ethernet switches 22 a , 22 b , 24 a , 24 b , 26 and 28 .
  • Ethernet switches 22 a , 22 b and 26 are located at the edges of carrier network 20
  • Ethernet switches 24 a , 24 b , and 28 are located in the core network.
  • Communications links (shown as straight lines in FIG. 2 ) are provided between Ethernet switches 22 a , 22 b , 24 a , 24 b , 26 and 28 .
  • These communications links may be relatively long distance links over optical equipment such as SONET/SDH equipment with Ethernet interfaces using Generic Framing Procedure (GFP) (ITU-T Recommendation G.7041/NY.1303).
  • GFP Generic Framing Procedure
  • core network switches 24 a , 24 b , and 28 are fully-meshed—ie there is a direct communications link connecting each core network switch 24 a , 24 b , and 28 to each other.
  • Edge network switches 22 a , 22 b and 26 are not fully-meshed but have at least one direct communication link to communications link to a core network switch 26 .
  • carrier networks may be implemented with virtually any number of Ethernet switches which, according to the present invention, may be connected in a fully-meshed or partially-meshed manner.
  • FIG. 4 shows how a carrier Ethernet network may provide connectivity between customer sites according to the present invention.
  • Three customers having respective pairs of geographically distant Ethernet switches ( 40 a and 40 b , 42 a and 42 b , and 44 a and 44 b ) are shown connected to carrier network 20 via edge Ethernet switches 22 a and 22 b respectively.
  • the communications links between edge switches 22 a and 22 b and customer switches 40 a , 40 b , 42 a , 42 b , 44 a , and 44 b may be dedicated links such as T 1 leased lines or access links such as digital Subscriber Lines (DSLs).
  • DSLs digital Subscriber Lines
  • Carrier edge switches 22 a , 22 b and 26 may be logically separated according to Nortel Network's Logical Provider Edge (LPE) architecture. Each carrier edge switch may thus be logically separated into a single Provider Edge- (PE-) Core and one or more PE-Edge functions.
  • the PE-Edge is the ingress/egress point at which customer traffic enters or leaves the provider network—ie carrier network 20 .
  • the PE-Core encapsulates incoming Ethernet traffic from the customer using Media Access Control (MAC) in MAC encapsulation and forwards the encapsulated traffic across the carrier network. Similarly the PE-Core decapsulates (strips) outgoing Ethernet traffic and forwards the stripped traffic on to the customer via the appropriate PE-Edge.
  • MAC Media Access Control
  • VLAN tags are used to provide customer separation at the PE-Core with each different customer site connected to each edge switch having a unique VLAN tag.
  • Stacked VLAN ie VLAN in VLAN encapsulation
  • VLAN may be used to protect any VLAN tags used by the customer traffic.
  • customer switch 42 a may send Ethernet traffic over communications link 46 a to PE-Edge of edge switch 22 a .
  • PE-Core of edge switch 22 a encapsulates each Ethernet frame in a further Ethernet frame using the MAC address of edge switch 22 a as the source address and the MAC address of the appropriate egress point—in this case edge switch 22 b —as the destination address.
  • the encapsulated traffic is forwarded across a connection established over communications links 48 of carrier network 20 to edge switch 22 b . Note that connections will typically be trunked in the sense that traffic from multiple customers will be routed through the same connection.
  • the original frames are stripped out and sent over communications link 46 b via PE-Edge of edge switch 22 b to customer switch 42 b.
  • the PE-Edge may also be physically separated from the PE-Core and may reside at customer premises whereas the PE-Core resides at a central office or Point of Presence (PoP) of the carrier.
  • PoP Point of Presence
  • other edge switches 26 will have connections to customer sites and that customers may have be provided with connectivity between two or more geographically distant sites over carrier network 20 .
  • a connection may be defined as an entity configured in a network which provides transport of data from a source node to one or more sink nodes.
  • carrier network 20 must be at least partially-meshed—ie there must be multiple paths between at least some, and preferably all, nodes of the network.
  • Ethernet MAC address auto learning functionality should preferably be at least partially deactivated.
  • Ethernet frames have source and destination MAC addresses corresponding to their source and destination Ethernet switches.
  • the receiving-switch observes the port on which the frame was received and the source address of the frame. It then builds up a forwarding table for use in future frame switching.
  • the forwarding table maps destination address to output port and is built up using the source address of a received frame and the input port on which it was received. Over time, the network builds up forwarding state enabling efficient switching of Ethernet frames.
  • FIG. 3 shows a control plane/transport plane architecture for controlling the Ethernet carrier network of FIG. 1 .
  • the ITU-T Automatically Switched Transport Network (ASTN), sometimes known as the Automatically Switched Optical Network (ASON), may be used.
  • the general architectural specification of the ASTN is set out in ITU-T Recommendation G.8080.
  • Control plane 30 comprises a number of connection controllers 32 a , 32 b , 34 a , 34 b , 36 and 38 corresponding to each of Ethernet switches 22 a , 22 b , 24 a , 24 b , 26 and 28 of carrier network 20 (not all connection controllers are labelled in FIG. 3 , for clarity).
  • Control Plane 30 may be conceptually thought of as lying ‘above’ transport plane 32 which comprises the Ethernet switches 22 a , 22 b , 24 a , 24 b , 26 and 28 of carrier network 20 .
  • Connection controllers (CCs) 34 are logical agents each corresponding to a respective Ethernet switch (which represent cross connects in ASTN terminology) in transport plane 32 .
  • Each CC controls the switching of its respective switch using Connection Control Interface (CCI) signalling (shown as dofted lines in FIG. 3 ).
  • CCI signalling is used to directly configure the forwarding tables used by Ethernet switches 22 a , 22 b , 24 a , 24 b , 26 and 28 of carrier network 20 .
  • CCs may communicate between themselves using Network to Network Interface (NNI).
  • NNI Network to Network Interface
  • CCs will exchange information regarding their operational state and the state, in particular the capacity, of their communications links using NNI signalling.
  • Other control plane functions such as heartbeat, ping and circuit monitoring may be provided using the ITU-T standard-in-preparation currently referred to as Y.17ethOAM.
  • CCs 32 a , 32 b , 34 a , 34 b , 36 and 38 are logically separate from Ethernet switches 22 a , 22 b , 24 a , 24 b , 26 and 28 , the reader will understand that they may be implemented in the same physical nodes. Furthermore, NNI signalling may take place over the same communications links used for transporting user traffic.
  • FIG. 5 shows how control plane 30 interacts with transport plane 32 to establish a point-to-point connection across carrier network 20 .
  • the connection will be bi-directional, although this can simply be considered as the combination of two unidirectional point to point connections.
  • a request to establish a connection specifying a required bandwidth and an explicit route across carrier network 20 is generated for example by a supervisory network management node (not shown) or distributed network management or function.
  • the explicit route will have been determined in accordance with a conventional routing protocol taking into account the topology of the carrier network, the operational state of network resources and the bandwidth requirements of existing and possible future connections.
  • the route to be taken by the exemplary connection shown in FIG. 5 spans Ethernet switches 22 a , 24 a , 24 b and 22 b over communications links 48 .
  • the request to establish a connection is first sent to CC 32 a .
  • CC 32 a checks whether the communications link between switches 22 a and 24 a has sufficient capacity to support the required bandwidth. If so, it forwards a connection setup request message 50 to CC 34 a specifying the required bandwidth and explicit route.
  • CC 34 a checks whether the communications link between switches 24 a and 24 b has sufficient capacity to support the required bandwidth. The process continues until the connection setup message request 50 reaches CC 32 b .
  • CCs may optionally reserve bandwidth of their respective switches and communication links so as to avoid race conditions where competing connections are setup over the same resources.
  • connection setup request message 50 When connection setup request message 50 reaches CC 32 b , if there is sufficient bandwidth along the entire path to support the required connection, then CC 32 b sends a connection setup response message 52 back to CC 34 b , CC 34 a and finally to CC 32 a . As the connection setup response message 52 traverses the CCs, each CC sends CCI signalling 54 to its respective switch to configure the forwarding tables of each switch, thereby to establish the forwarding state required to setup the connection.
  • each switch will typically have a large number of connections established through it at any point in time.
  • each switch must be able to forward data traffic according to the explicit route requirements of the specific connection through which that traffic is being sent.
  • a likely scenario is that the carrier network will need to establish multiple connections from the same source nodes, multiple connections to the same destination nodes and multiple connections both from the same source nodes and to the same destination nodes.
  • traffic engineering even the latter connections may need to be established through different routes across the network.
  • these routes may need to converge and diverge again within the carrier network.
  • each switch be able to differentiate between data traffic travelling in different connections and forward accordingly.
  • VLAN tags are used in a novel manner to enable differentiation of connections established across a carrier network and thereby to enable differential forwarding.
  • Ethernet switches of carrier network 20 are VLAN-aware and use the combination of destination address and VLAN tag to forward data traffic. This may be achieved by each Ethernet switch storing separate forwarding tables for each VLAN tag configured, the VLAN tag acting as an mapping (or indexing) to the forwarding tables and each forwarding table mapping destination address to output port as normal.
  • the group of forwarding tables provide a mapping from a combination of destination address and VLAN tag to output port.
  • the switch on receiving an Ethernet frame (step 60 ), the switch first selects a forwarding table based on the VLAN tag contained in the frame (step 62 ). Then, the switch selects an output port based on the destination address contained in the frame (step 64 ). Finally, the switch forwards the frame on the selected output port (step 66 ).
  • VLAN-aware bridges Note that this functionality is similar to that performed by the prior art VLAN-aware bridges described above with reference to FIG. 1 .
  • VLAN tags to enable the establishment and differentiation of connections across a carrier network is believed to be entirely novel and inventive.
  • VLAN tags and entries in forwarding tables corresponding to connections to be established across the carrier network are directly configured into the appropriate Ethernet switches using the connection setup process described above.
  • Data traffic is associated with a particular connection on entry into the carrier network (more specifically at the ingress PE-Core) by giving the frames a selected VLAN tag as well as destination address (ie the MAC address of the egress PE-Core). Note that encapsulation will already have taken place and thus the raw Ethernet frames received from the customer will not be altered in this process.
  • FIGS. 7 and 8 show how the use of a combination of VLAN tag and destination address enables differentiation between connections.
  • FIG. 9 shows how lack of differentiation in the combination of VLAN tag and destination address necessitates convergence between connections.
  • FIGS. 7 to 9 show connections across a carrier network comprising 4 provider edge Ethernet switches 71 , 72 , 73 and 74 (corresponding to PE 1 , PE 2 , PE 3 , PE 4 ), further Ethernet switches in core 78 including core Ethernet switch 75 , and communications links between the core and edge switches (reference numerals omitted for clarity).
  • connections 76 and 77 have both the same source address (edge Ethernet switch 71 —PE 1 ) and destination address (edge Ethernet switch 73 —PE 3 ). However, the routes that connections 76 and 77 traverse are different.
  • connections 76 and 77 converge and then immediately diverge.
  • core Ethernet switch 75 is able to differentiate frames belonging to connection 76 from frames belonging to connection 77 (and to forward them accordingly) on the basis of their different VLAN tags.
  • data traffic in connection 76 has the VLAN tag 2 , for example, whereas data traffic in connection 77 has the VLAN tag 1 .
  • connections 80 and 82 have both the same source address (edge Ethernet switch 71 —PE 1 ) and are given the same VLAN tag (in this case the VLAN tag is 1 ), but have different destination addresses (connection 80 has edge Ethernet switch 73 —PE 3 while connection 82 has edge Ethernet switch 74 —PE 4 ). Again, the routes that connections 80 and 82 traverse are different. In particular, it can be seen that at core Ethernet switch 75 , connections 80 and 82 converge and then follow the same path before diverging towards their destination points. Despite the common VLAN tags, core Ethernet switch 75 is able to differentiate frames belonging to connection 76 from frames belonging to connection 77 (and to forward them accordingly) on the basis of their different destination addresses.
  • FIG. 9 shows how lack of differentiation in the combination of VLAN tag and destination address necessitates convergence between connections.
  • connections 90 and 92 have the same destination address (edge Ethernet switch 73 —PE 3 ), and are given the same VLAN tag (in this case the VLAN tag is 1), but have different source address (connection 90 has edge Ethernet switch 71 —PE 1 while connection 92 has edge Ethernet switch 72 —PE 2 ).
  • the routes that connections 90 and 92 traverse are different, but this is only because the data traffic is injected into the carrier network from different ingress points—ie edge Ethernet switches 71 and 72 .
  • Once the routes converge at core Ethernet switch 75 they stay converged until their destination at edge Ethernet switch 73 .
  • one (or both) of the data traffic flows may be re-routed by simply provisioning a new connection with a different VLAN tag and then using that VLAN tag in the MAC header of the Ethernet frames at the ingress point.
  • This re-routing of data flows is hitless since the new connection may be established contemporaneously with the old connection and new Ethernet frames directed into the new connection while earlier frames are still in transit over the old connection.
  • re-routing may occur without requiring any re-ordering of frames at the destination.
  • point-to-multipoint or multipoint-to-multipoint connections may also be established across Ethernet networks as will now be briefly described.
  • Conventional Ethernet switches are capable of multicast service. Typically this is achieved by configuring the forwarding table with more than one output port (but not necessarily all output ports) for a given multicast destination address.
  • a point-to-multipoint connection may be configured as described above but using a combination of VLAN tag and multicast address mapping to more than one output port (but not necessarily all output ports) of selected Ethernet switches.
  • this approach is only suitable for relatively small scale multicast operation.
  • RPR Resilient Packet Ring
  • Ethernet MAC addressed network using multiple unicast connections established as described above.
  • VPN virtual private network
  • Two modes of operation are envisaged: a sparse mode for many customers with few sites, and a dense mode for few customers with many sites. The detailed mechanisms are described in one of the Applicants' co-pending U.S. patent application Ser. No.
  • FIG. 10 shows a sparse mode of broadcast operation for many customers with few sites.
  • FIG. 10 shows a part of carrier network 20 comprising a part of fully-meshed core network 100 , PE-Core edge Ethernet switches 104 a to d and PE-Edge edge Ethernet switches 102 .
  • Broadcast traffic 106 a is received at PE-Core switch 104 b from a customer site. Note that this traffic is broadcast within the context of a particular customer VPN, but is multicast within the context of the carrier network as a whole.
  • the traffic is encapsulated and placed onto an RPR emulated by 4 unidirectional connections 108 a to d .
  • the four connections are established as point-to-point connections as described above.
  • each endpoint of the four connections determines whether to process the frame for distribution to the customer via PE-Edge edge Ethernet switches 102 to which it is connected. This is done on the basis of broadcast destination addresses contained in the frames, and the VPN membership of customer sites attached to these Ethernet switches. Processing the frames involves decapsulating them and replicating them as required to one or more of PE-Edge edge Ethernet switches 102 . It can be seen that no bandwidth need be dedicated to broadcast traffic in the sparse mode of operation since the four point-to-point connections may be trunked—ie they may be used to carry non-broadcast data and other customer's data, whether broadcast or not.
  • FIG. 11 shows a dense mode of broadcast operation for few customers with many sites.
  • FIG. 11 shows a part of carrier network 20 comprising a part of fully-meshed core network 100 , PE-Core edge Ethernet switches 104 a to d and PE-Edge edge Ethernet switches 102 as with FIG. 10 .
  • Broadcast traffic 110 a is received at PE-Core switch 104 b from a customer site. Note, as above, that this traffic is broadcast within the context of a particular customer VPN, but is multicast within the context of the carrier network as a whole.
  • the traffic is encapsulated and forwarded over a uni-directional connection 110 b to a core switch 116 a .
  • Uni-directional connection 110 b may be trunked.
  • the traffic is forwarded in over a bi-directional RPR 112 emulated by connections between core switches 116 a to d using a bidirectional connection between each pair of adjacent nodes.
  • the RPR is dedicated to a particular customer's broadcast traffic and is not trunked. This is achieved by using a unique VLAN tag for forwarding in the RPR.
  • the traffic is forwarded around RPR 112 to each of the core switches 116 a to d in one direction or the other, whichever is shortest for each respective core switch.
  • Each core switch broadcasts the received frames over uni-directional connections 114 a so that each of PE-Core switches 104 a to d receives the traffic.
  • each PE-Core switch determines whether to process the frame for distribution to the customer via PE-Edge edge Ethernet switches 102 to which it is connected. This is done on the basis of broadcast destination addresses contained in the frames and involves decapsulating and replicating them as required to one or more of PE-Edge switches 102 for onward transmission to the customer sites.
  • connections may be established over a meshed Ethernet carrier network through configuring forwarding tables in network nodes and how data may be forwarded over those connections.
  • connections may be removed by deleting the configuration data from every node over which the connection was established. It is important that all such configuration data is removed to avoid network failure or inefficiency.
  • the default behaviour of Ethernet switches on receiving a frame addressed to an unknown destination ie where there is no forwarding state configured for that destination address
  • this behaviour is appropriate.
  • this behaviour can be catastrophic.
  • Ethernet switches One solution to the problem of partial removal of connections is to alter the behaviour of the Ethernet switches forming the carrier network so that instead of broadcasting unknown traffic, they discard packets and possibly issue an alarm, log or count the discarded packets.
  • altering the basic behaviour of Ethernet switches may require a hardware modification. While possible, this is not preferable.
  • conventional Ethernet switches generally provide a software configurable function called rate limitation.
  • rate limitation Preferably, at all or most switches of the carrier rate limitation is used to set a rate of zero, or a low rate if zero is not possible, for broadcast traffic including broadcast-on-unknown traffic.
  • One approach is to use block lists.
  • Conventional Ethernet switches provide a block list (typically of limited length) which may be used to specify certain destination MAC addresses such that received Ethernet frames addressed to these blocked address will be discarded without forwarding.
  • the MAC addresses of many (but not all) MAC addresses of provider edge nodes it is possible to minimise the potential dangers of partial removal of connections without over restricting the carrier's flexibility in establishing connections across the network. Notably, it is necessary to block different MAC address at different nodes of the network.
  • the block list will include only the MAC address for provider edge nodes to which no connections are likely to be established through that node.
  • This approach is not easily scaleable with large networks (the limited number of entries in block lists may be exhausted by large numbers of provider edge nodes).
  • the limited number of entries in block lists may be exhausted by large numbers of provider edge nodes.
  • VLAN tags While it is the use of VLAN tags in the present invention that enables flexibility in establishing connections across the network, the failure to remove VLAN state fully leaves the potential for looping of traffic. In particular, the problem will arise where a logical loop is left configured for any single given VLAN tag—ie the output ports of nodes defining a physical loop are left configured with membership of any single VLAN.
  • another pre-emptive approach to minimising the problems of partial removal of connections is to allocate connections to or from neighbouring or nearby provider edge nodes using mutually exclusive VLAN tag pools. Thus, for example all connections to or from provider edge node PE 1 will be guaranteed to have a different VLAN tag to those to or from neighbouring provider edge node PE 2 .
  • VLAN loops including both PE 1 and PE 2 cannot accidentally be formed through the partial removal of connections since by definition any state left configured in PE 1 and PE 2 will use different VLAN tags.
  • This approach may be generalised by allocating connections to or from n adjacent provider edge nodes using n mutually exclusive VLAN tag pools. n is chosen to be sufficiently large to segregate use of VLAN tag pools as much as possible while providing sufficient flexibility in connection establishment to or from any particular provider edge node (remembering that there are only 4094 possible VLAN tags). With smaller carrier networks it may be possible for each provider edge node to use a different VLAN tag pool. However, with larger carrier networks it will be necessary to re-use VLAN tag pools at topologically distant provider edge nodes otherwise flexibility in connection establishment will be compromised though VLAN tag pools being too small.
  • VLAN tags for enabling flexibility in establishing and differential forwarding of data traffic associated with different connections
  • the reader will appreciate that other tags or identifiers may be used.

Abstract

The invention relates to enabling traffic engineering in frame-based networks such as Ethernet networks. There is described a method of and connection controller for establishing connections (76, 77) in a frame-based communications network comprising nodes (71-75 and 78) such as Ethernet switches. The connections are established by configuring, in various of the nodes, mappings for forwarding data frames, such as Ethernet frames. The mappings are from a combination of a) a destination address corresponding to a destination node (73) of the connection and b) an identifier, such as a VLAN tag. The mappings are to selected output ports of the various nodes. By using the combination of destination address AND identifier, the mappings enable data frames belonging to different connections (76, 77) to be forwarded differentially (ie forwarded on different output ports) at a node (75) despite the different connections having the same destination node. This enables flexibility in routing connections—ie the ability to perform traffic engineering.

Description

    FIELD OF THE INVENTION
  • The present invention relates to methods of, software for and apparatus for enabling traffic engineering in carrier networks.
  • BACKGROUND TO THE INVENTION
  • For many years now, telecommunications carriers have been deploying packet-switched networks in place of circuit-switched networks for reasons of efficiency and economy. Packet-switched networks such as Internet Protocol (IP) or Ethernet networks are intrinsically connectionless in nature and as a result suffer from Quality of Service (QoS) problems. Customers value services which are guaranteed in terms of bandwidth and QoS.
  • Carriers may use Multi-Protocol Label Switching (MPLS) over a layer 2 network to create connection-oriented label switched paths (or tunnels) across the intrinsically connectionless network, and thereby to provide guaranteed QoS and bandwidth services to customers. However, MPLS is a relatively unstable standard and carriers desire an alternative.
  • It is desired to use Ethernet switches in carrier's networks. Use of Ethernet switches in carrier's networks would have the advantages of interoperability (mappings between Ethernet and other frame/packet/cell data structures such as IP and ATM are well known) and economy (Ethernet switches are relatively inexpensive compared to IP routers, for example).
  • However, the behaviour of conventional switched Ethernet networks is incompatible with carriers' requirements for providing guaranteed services to customers. Carriers need networks to be meshed for load balancing and resiliency—ie there must be multiple paths across it—and the ability to perform traffic engineering—ie the ability of the network operator to control the provision of explicitly routed variable bandwidth connections (or tunnels) through which traffic may be directed.
  • In contrast, conventional Ethernet networks must be simply-connected—ie there must be one and only one path between each and every node of the network. As a consequence, conventional Ethernet networks do not have support for network-wide load balancing, suffer from resiliency problems and cannot support traffic engineering.
  • Spanning tree protocols are known which enable a physically meshed Ethernet network to be logically transformed into a simply-connected network by detecting physical loops and logically disabling connections to break up the loops. Spanning tree protocols are also known which are able to detect failure of a physical connection (thereby partitioning the fully-connected network) and automatically restore one or more previously-disabled physical connections so as to re-connect the network. This provides a degree of resiliency. However, carriers are capable of and so desire to plan their network traffic routes to achieve much higher resiliency, flexibility and efficiency than spanning tree can achieve. This routing can most easily be achieved by segregating the traffic into connections whose routes are determined as part of this planning process.
  • Virtual Bridged LANs (or VLANs) are described in the Institute of Electrical and Electronics Engineers (IEEE) standard 802.1Q, 2003 Edition. FIG. 1 shows a conventional VLAN 10 split up into a plurality of component LANs 12 and connected via VLAN-aware Media Access Control (MAC) bridges 14. Component LANs 12 are typically provided for different communities of interest, such as users sharing a common server or having common network protocol requirements. Unique identifiers (VLAN tags or VLAN IDs) are used to identify each component LAN. Broadcast traffic is broadcast only within component LANs. This helps to overcome the scalability issues of the Ethernet by separating the whole VLAN 10 into smaller broadcast domains. VLAN tags are used to distinguish between traffic for different component LANs when forwarding traffic on shared links between MAC bridges.
  • The Internet Engineering Task Force (IETF) has published an Internet Draft referred to as draft-kawakami-mpls-lsp-vlan-00:txt. This document describes the use of VLAN tags for label switching across Ethernet networks in a manner similar to use of MPLS labels for label switching over MPLS networks—VLAN tags are used as labels to mark traffic at an ingress point of a label switched path (LSP) as belonging to a Layer 2 tunnel, and VLAN-aware Ethernet switches in the network act as a VLAN label switched routers. Connections are formed using one or more LSPs. Intermediate nodes along the connection may optionally swap the inbound label to a different outbound label.
  • One problem with the method proposed in draft-kawakami-mpls-lsp-vlan-00.txt is that a maximum of 4094 unique VLAN tags are definable in 802.1Q compliant equipment. This limits the flexibility in and increases the complexity of provisioning connections across the network. Another problem is that connections may not easily be re-routed once provisioned without creating transitory loops.
  • Another problem is that the Frame Check Sequence (FCS) in Ethernet frames is computed over both the payload and header portions of the frame. Thus, with the method proposed in draft-kawakami-mpls-lsp-vlan-00.txt, every time a VLAN tag (ie a label) is swapped at the ingress or egress point of a LSP, the FCS needs to be recomputed since the VLAN tag will have changed. This requires performing a computation function over the entire Ethernet frame. Moreover, during the interval from when the original FCS is removed and the new FCS added, the frame is vulnerable to corruption without the protection of any FCS.
  • Another problem with the ‘label-swapping’ approach proposed in draft-kawakami-mpls-lsp-vlan-00.txt is that it requires a “chain of correctness” in that forwarding relies on each local label-forwarded link on the LSP being correct, whereas conventional Ethernet which uses globally unique address information to perform forwarding. More importantly, from a practical perspective, ‘label-swapping’ behaviour represents a significant change from conventional Ethernet switch functionality, and current telecommunications standards.
  • SUMMARY OF THE INVENTION
  • The present invention relates to enabling traffic engineering in frame-based networks such as Ethernet networks. The term traffic engineering is used broadly in the present document to refer to functions for maintaining the quality of service of the customers' connections while permitting the owner to operate their network efficiently. Examples of this are ensuring that no link is over-loaded, load-balancing the connections evenly across the network, re-equalizing the load on the network by re-routing some existing connections, establishing protection mechanisms, performing traffic restoration actions, and so on.
  • According to the present invention, connections are established in the carrier network by configuring, in one or more network nodes, mappings for forwarding data frames such as Ethernet frames. The mappings are from a combination of a) a destination address corresponding to a destination node of a connection, such as a MAC address, and b) an identifier, such as a VLAN tag. The mappings are to selected output ports of the one or more nodes. By using the combination of destination address AND identifier, the mappings enable data frames belonging to different connections to be forwarded differentially (ie forwarded on different output ports) despite the different connections potentially having the same destination node. This enables flexibility in routing connections—eg the ability to perform traffic engineering. The reader should note that the term address is used in this document to denote any means of identifying a network node or an ingress or egress interface of a network node.
  • According to a first aspect of the present invention, there is provided a method of establishing connections in a frame-based network, the method comprising the step of configuring, in one or more nodes of the network, first mappings for use in forwarding data frames, the first mappings being from a combination of a first destination address corresponding to a first destination node of the network, and a first identifier, the first mappings being to a selected output port of, or to respective selected output ports of each of, the one or more nodes, thereby establishing at least part of a first connection through the one or more nodes to the first destination node.
  • Advantageously, the present invention enables connections to be established in a frame-based network in a highly flexible manner enabling network-wide traffic engineering. Furthermore, the specific problems inherent in the method proposed in draft-kawakami-mpls-lsp-vlan-00.txt (processing overhead and vulnerability of frames to corruption) are overcome since no label swapping is performed.
  • In one embodiment, the method of the present invention includes configuring, in at least one of the nodes, a second mapping for use in forwarding data frames, the second mapping being from a combination of: a second destination address corresponding to a second destination node of the network, and a second identifier, the second mapping being to a selected output port of the at least one node, thereby establishing at least part of a second connection through the at least one node to the second destination node, the selected output ports of the at least one node being different for the first and second mappings, thereby enabling, at the at least one node, differential forwarding of data frames associated with the first and second connections.
  • Thus, advantageously, two connections may be established which converge in route at an intermediate node and then diverge again, for example.
  • In one embodiment, the first and second destination addresses and the first and second destination nodes are the same. Thus, for example, two connections may be established which converge at an intermediate node and then diverge, despite having the same destination node. This enables greater flexibility in setting up connections.
  • In one embodiment, the first and second identifiers are the same. Thus, for example, two connections may be established which converge at an intermediate node and then diverge, despite using the same identifier. Thus, limitations on the number of values identifiers can take do not significantly reduce flexibility in traffic engineering.
  • Preferably, the network is an Ethernet network and the one or more nodes are Ethernet switches. Preferably, the identifier is a VLAN tag. Advantageously, this enables traffic engineered carrier networks to be deployed using conventional and relatively inexpensive VLAN-aware Ethernet switches, albeit configured in an entirely novel and inventive manner.
  • In one embodiment, the configuration is performed by a control plane of the network. Thus, carriers have direct control over the establishment of traffic engineering connections in the network. Preferably, the control plane is ASON/ASTN.
  • A frame-based communications network comprising one or more nodes arranged to perform the method of the first aspect of the present invention set out above is also provided.
  • Software arranged to perform the method of the first aspect of the present invention set out above is also provided.
  • According to a second aspect of the present invention, there is provided a connection controller for establishing connections in a frame-based network, the connection controller comprising: a signal generator capable of generating a first signal for configuring, in a transport node of the network, a first mapping for use in forwarding data frames, the first mapping being from a combination of: a first destination address corresponding to a first destination node of the network, and a first identifier, the first mapping being to a selected output port of the transport node, the first signal thereby establishing at least part of a first connection through the transport node to the first destination node.
  • According to a third aspect of the present invention, there is provided a method of establishing a connection in a frame-based network, the method comprising the steps of: configuring forwarding information in a plurality of nodes of the network the forwarding information enabling the nodes to forward data frames in dependence on a combination of a destination address and an identifier of the data frames.
  • According to a fourth aspect of the present invention, there is provided a method of data traffic engineering in a frame-based network, the method comprising the following steps: establishing a first and second connections in the network passing through a common switching node of the network, configuring the switching node to forward data frames differently in dependence on differences in either a destination address or an identifier of the data frames, thereby enabling data traffic engineering.
  • According to a fifth aspect of the present invention, there is provided a method of establishing connections in a frame-based network, the method comprising the step of: configuring, in each of a first plurality of nodes of the network, a first forwarding mapping from a first combination of a destination address and an identifier to a selected output port of a respective node of the first plurality of nodes.
  • According to a sixth aspect of the present invention, there is provided a connection controller for establishing connections in a frame-based network, the connection controller being arranged to configure a first forwarding mapping in a transport node, the first mapping being from a first combination of a destination address and an identifier to a first output port of the transport node.
  • According to a seventh aspect of the present invention, there is provided a method of forwarding data frames in a frame-based network, the method comprising the steps of: establishing a first connection in the network, the first connection being associated with a first combination of a destination address and an identifier, and forwarding data frames in the network in dependence on a combination of a destination address and an identifier of the data frames.
  • Further aspects of the present invention are set out in the appended claims. Further advantages of the present invention will be apparent from the following description.
  • In order to show how the invention may be carried into effect, embodiments of the invention are now described below by way of example only and with reference to the accompanying figures in which:
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows a conventional Virtual Bridged LAN;
  • FIG. 2 shows an arrangement of Ethernet switches forming a carrier network according to the present invention;
  • FIG. 3 shows a control plane/transport plane architecture for controlling the Ethernet carrier network of FIG. 1 according to the present invention;
  • FIG. 4 shows the carrier Ethernet network of FIG. 1 arranged to provide connectivity between customer sites according to the present invention;
  • FIG. 5 shows how nodes of the control plane interact with Ethernet switches of the transport plane to establish a connection across carrier network according to the present invention;
  • FIG. 6 is a flow diagram showing the use of VLAN tag and destination address to differentiate forwarding of data traffic in different connections across the carrier network, according to the present invention;
  • FIG. 7 shows an example of differential forwarding for two traffic flows having the same source and destination provider edge nodes but different VLAN tags according to the present invention;
  • FIG. 8 shows an example of differential forwarding for two traffic flows having the same source provider edge nodes and VLAN tags but different destination provider edge nodes according to the present invention;
  • FIG. 9 shows an example of converged routing for two traffic flows having the same destination provider edge node and VLAN tags but different source provider edge node according to the present invention;
  • FIG. 10 shows a sparse mode of broadcast operation for customer VPNs provisioned across a carrier network, according to the present invention.
  • FIG. 11 shows a dense mode of broadcast operation for customer VPNs provisioned across a carrier network, according to the present invention.
  • DETAILED DESCRIPTION OF INVENTION
  • Embodiments of the present invention are described below by way of example only. These examples represent the best ways of putting the invention into practice that are currently known to the Applicant although they are not the only ways in which this could be achieved.
  • To support guaranteed QoS to customers, what is required is:
      • 1) an at least partially meshed carrier network;
      • 2) the ability to establish explicitly routed connections across the carrier network between any two edge nodes (traffic engineering); and
      • 3) the ability to enforce any bandwidth restrictions applied to the connections.
  • The present invention is primarily concerned with enabling requirements 1) and 2) above in frame-based networks such as Ethernet networks. Requirement 3) may be achieved using conventional mechanisms such as admission control at the ingress nodes of connections (trusted-edge policing).
  • FIG. 2 shows an arrangement of Ethernet switches and communications links forming a carrier network according to the present invention. Carrier network cloud 20 comprises Ethernet switches 22 a, 22 b, 24 a, 24 b, 26 and 28. Ethernet switches 22 a, 22 b and 26 are located at the edges of carrier network 20, whereas Ethernet switches 24 a, 24 b, and 28 are located in the core network. Communications links (shown as straight lines in FIG. 2) are provided between Ethernet switches 22 a, 22 b, 24 a, 24 b, 26 and 28. These communications links may be relatively long distance links over optical equipment such as SONET/SDH equipment with Ethernet interfaces using Generic Framing Procedure (GFP) (ITU-T Recommendation G.7041/NY.1303).
  • Note that core network switches 24 a, 24 b, and 28 are fully-meshed—ie there is a direct communications link connecting each core network switch 24 a, 24 b, and 28 to each other. Edge network switches 22 a, 22 b and 26 are not fully-meshed but have at least one direct communication link to communications link to a core network switch 26. The reader will appreciate that the particular network arrangement described is exemplary. In general, carrier networks may be implemented with virtually any number of Ethernet switches which, according to the present invention, may be connected in a fully-meshed or partially-meshed manner.
  • FIG. 4 shows how a carrier Ethernet network may provide connectivity between customer sites according to the present invention. Three customers having respective pairs of geographically distant Ethernet switches (40 a and 40 b, 42 a and 42 b, and 44 a and 44 b) are shown connected to carrier network 20 via edge Ethernet switches 22 a and 22 b respectively. The communications links between edge switches 22 a and 22 b and customer switches 40 a, 40 b, 42 a, 42 b, 44 a, and 44 b may be dedicated links such as T1 leased lines or access links such as digital Subscriber Lines (DSLs).
  • Carrier edge switches 22 a, 22 b and 26 may be logically separated according to Nortel Network's Logical Provider Edge (LPE) architecture. Each carrier edge switch may thus be logically separated into a single Provider Edge- (PE-) Core and one or more PE-Edge functions. The PE-Edge is the ingress/egress point at which customer traffic enters or leaves the provider network—ie carrier network 20. The PE-Core encapsulates incoming Ethernet traffic from the customer using Media Access Control (MAC) in MAC encapsulation and forwards the encapsulated traffic across the carrier network. Similarly the PE-Core decapsulates (strips) outgoing Ethernet traffic and forwards the stripped traffic on to the customer via the appropriate PE-Edge. VLAN tags are used to provide customer separation at the PE-Core with each different customer site connected to each edge switch having a unique VLAN tag. Stacked VLAN (ie VLAN in VLAN encapsulation) may be used to protect any VLAN tags used by the customer traffic.
  • For example, customer switch 42 a may send Ethernet traffic over communications link 46 a to PE-Edge of edge switch 22 a. PE-Core of edge switch 22 a encapsulates each Ethernet frame in a further Ethernet frame using the MAC address of edge switch 22 a as the source address and the MAC address of the appropriate egress point—in this case edge switch 22 b—as the destination address. The encapsulated traffic is forwarded across a connection established over communications links 48 of carrier network 20 to edge switch 22 b. Note that connections will typically be trunked in the sense that traffic from multiple customers will be routed through the same connection. At the PE-Core of edge switch 22 b, the original frames are stripped out and sent over communications link 46 b via PE-Edge of edge switch 22 b to customer switch 42 b.
  • The reader will appreciate that in alternative embodiments of the present invention the PE-Edge may also be physically separated from the PE-Core and may reside at customer premises whereas the PE-Core resides at a central office or Point of Presence (PoP) of the carrier. The reader will also appreciate that other edge switches 26 will have connections to customer sites and that customers may have be provided with connectivity between two or more geographically distant sites over carrier network 20.
  • It will now be described how carrier network 20 is arranged to establish connections through which to forward encapsulated Ethernet traffic. A connection may be defined as an entity configured in a network which provides transport of data from a source node to one or more sink nodes.
  • As described above, carrier network 20 must be at least partially-meshed—ie there must be multiple paths between at least some, and preferably all, nodes of the network. Thus, as will be explained below, Ethernet MAC address auto learning functionality should preferably be at least partially deactivated.
  • On start-up (or on re-start), conventional switched Ethernet networks behave like a “classic” Ethernet Local Area Networks (LANs) in that every Ethernet frame is broadcast across the entire network. Thus, every switch, receiving an Ethernet frame on one port, broadcasts the frame out on every other port. The process repeats as the frame is received by other switches thus broadcasting the frame across the entire network.
  • MAC address auto-learning functionality is provided to improve efficiency in switched Ethernet networks. Ethernet frames have source and destination MAC addresses corresponding to their source and destination Ethernet switches. When an Ethernet frame sent out by a source switch is received by an intermediate or destination Ethernet switch, the receiving-switch observes the port on which the frame was received and the source address of the frame. It then builds up a forwarding table for use in future frame switching. The forwarding table maps destination address to output port and is built up using the source address of a received frame and the input port on which it was received. Over time, the network builds up forwarding state enabling efficient switching of Ethernet frames.
  • It can thus be seen that conventional switched Ethernet networks using auto-learning must be simply-connected—ie there must be one and only one path between each and every node of the network. If there were multiple paths between any two nodes, the input port on which a frame is received from a source node would not be a reliable indicator of the correct output port to forward future traffic destined for that node. Inconsistencies in forwarding tables on Ethernet switches would result in looping of frames. Moreover, if there exists any loop in an part of the network then any broadcast packet will be continuously duplicated in that loop and the duplicates forwarded all over the whole network, limited only by the link capacities concerned. This inevitably results in catastrophic failure of the network.
  • According to the present invention, instead of using auto learning to configure forwarding tables in Ethernet switches, forwarding tables are directly configured using a novel Ethernet control plane. FIG. 3 shows a control plane/transport plane architecture for controlling the Ethernet carrier network of FIG. 1. The ITU-T Automatically Switched Transport Network (ASTN), sometimes known as the Automatically Switched Optical Network (ASON), may be used. The general architectural specification of the ASTN is set out in ITU-T Recommendation G.8080.
  • Control plane 30 comprises a number of connection controllers 32 a, 32 b, 34 a, 34 b, 36 and 38 corresponding to each of Ethernet switches 22 a, 22 b, 24 a, 24 b, 26 and 28 of carrier network 20 (not all connection controllers are labelled in FIG. 3, for clarity). Control Plane 30 may be conceptually thought of as lying ‘above’ transport plane 32 which comprises the Ethernet switches 22 a, 22 b, 24 a, 24 b, 26 and 28 of carrier network 20. Connection controllers (CCs) 34 are logical agents each corresponding to a respective Ethernet switch (which represent cross connects in ASTN terminology) in transport plane 32. Each CC controls the switching of its respective switch using Connection Control Interface (CCI) signalling (shown as dofted lines in FIG. 3). CCI signalling is used to directly configure the forwarding tables used by Ethernet switches 22 a, 22 b, 24 a, 24 b, 26 and 28 of carrier network 20. CCs may communicate between themselves using Network to Network Interface (NNI). Typically, CCs will exchange information regarding their operational state and the state, in particular the capacity, of their communications links using NNI signalling. Other control plane functions such as heartbeat, ping and circuit monitoring may be provided using the ITU-T standard-in-preparation currently referred to as Y.17ethOAM.
  • While CCs 32 a, 32 b, 34 a, 34 b, 36 and 38 are logically separate from Ethernet switches 22 a, 22 b, 24 a, 24 b, 26 and 28, the reader will understand that they may be implemented in the same physical nodes. Furthermore, NNI signalling may take place over the same communications links used for transporting user traffic.
  • FIG. 5 shows how control plane 30 interacts with transport plane 32 to establish a point-to-point connection across carrier network 20. Typically, the connection will be bi-directional, although this can simply be considered as the combination of two unidirectional point to point connections. A request to establish a connection specifying a required bandwidth and an explicit route across carrier network 20 is generated for example by a supervisory network management node (not shown) or distributed network management or function. The explicit route will have been determined in accordance with a conventional routing protocol taking into account the topology of the carrier network, the operational state of network resources and the bandwidth requirements of existing and possible future connections. The route to be taken by the exemplary connection shown in FIG. 5 spans Ethernet switches 22 a, 24 a, 24 b and 22 b over communications links 48.
  • The request to establish a connection is first sent to CC 32 a. On receipt, of the request, CC 32 a checks whether the communications link between switches 22 a and 24 a has sufficient capacity to support the required bandwidth. If so, it forwards a connection setup request message 50 to CC 34 a specifying the required bandwidth and explicit route. CC 34 a then checks whether the communications link between switches 24 a and 24 b has sufficient capacity to support the required bandwidth. The process continues until the connection setup message request 50 reaches CC 32 b. Along the route, CCs may optionally reserve bandwidth of their respective switches and communication links so as to avoid race conditions where competing connections are setup over the same resources.
  • When connection setup request message 50 reaches CC 32 b, if there is sufficient bandwidth along the entire path to support the required connection, then CC 32 b sends a connection setup response message 52 back to CC 34 b, CC 34 a and finally to CC 32 a. As the connection setup response message 52 traverses the CCs, each CC sends CCI signalling 54 to its respective switch to configure the forwarding tables of each switch, thereby to establish the forwarding state required to setup the connection.
  • It will be appreciated that the mechanism for establishing connections across carrier network 20 described above is merely exemplary and other well-known mechanisms may be used.
  • How forwarding tables of the Ethernet switches of carrier network 20 are used to support connections is a key aspect of the present invention and will now be described in detail.
  • Typically, there will be many thousands or tens of thousands of connections established across a carrier network at any time. These connections will share the physical resources of the carrier network—ie the switches and communications links. Thus, each switch will typically have a large number of connections established through it at any point in time. However, each switch must be able to forward data traffic according to the explicit route requirements of the specific connection through which that traffic is being sent. A likely scenario is that the carrier network will need to establish multiple connections from the same source nodes, multiple connections to the same destination nodes and multiple connections both from the same source nodes and to the same destination nodes. However, for traffic engineering, even the latter connections may need to be established through different routes across the network. Furthermore, these routes may need to converge and diverge again within the carrier network. To support such route flexibility in connections, what is required is that each switch be able to differentiate between data traffic travelling in different connections and forward accordingly.
  • However, conventional switched Ethernet is incapable of this. As described above, conventional Ethernet switches forward traffic based solely on a forwarding table (established through auto learning) mapping destination address to output port. As a result, a conventional Ethernet switch will not be able to differentiate between data traffic having the same destination address, although it may be associated with multiple different connections.
  • According to the present invention, VLAN tags are used in a novel manner to enable differentiation of connections established across a carrier network and thereby to enable differential forwarding. Ethernet switches of carrier network 20 are VLAN-aware and use the combination of destination address and VLAN tag to forward data traffic. This may be achieved by each Ethernet switch storing separate forwarding tables for each VLAN tag configured, the VLAN tag acting as an mapping (or indexing) to the forwarding tables and each forwarding table mapping destination address to output port as normal. Thus the group of forwarding tables provide a mapping from a combination of destination address and VLAN tag to output port.
  • Thus, as shown in FIG. 6, on receiving an Ethernet frame (step 60), the switch first selects a forwarding table based on the VLAN tag contained in the frame (step 62). Then, the switch selects an output port based on the destination address contained in the frame (step 64). Finally, the switch forwards the frame on the selected output port (step 66).
  • Note that this functionality is similar to that performed by the prior art VLAN-aware bridges described above with reference to FIG. 1. However, the use of VLAN tags to enable the establishment and differentiation of connections across a carrier network is believed to be entirely novel and inventive.
  • According to the present invention, VLAN tags and entries in forwarding tables corresponding to connections to be established across the carrier network are directly configured into the appropriate Ethernet switches using the connection setup process described above. Data traffic is associated with a particular connection on entry into the carrier network (more specifically at the ingress PE-Core) by giving the frames a selected VLAN tag as well as destination address (ie the MAC address of the egress PE-Core). Note that encapsulation will already have taken place and thus the raw Ethernet frames received from the customer will not be altered in this process.
  • FIGS. 7 and 8 show how the use of a combination of VLAN tag and destination address enables differentiation between connections. FIG. 9 shows how lack of differentiation in the combination of VLAN tag and destination address necessitates convergence between connections. Each of FIGS. 7 to 9 show connections across a carrier network comprising 4 provider edge Ethernet switches 71, 72, 73 and 74 (corresponding to PE1, PE2, PE3, PE4), further Ethernet switches in core 78 including core Ethernet switch 75, and communications links between the core and edge switches (reference numerals omitted for clarity).
  • In FIG. 7, connections 76 and 77 have both the same source address (edge Ethernet switch 71—PE1) and destination address (edge Ethernet switch 73—PE3). However, the routes that connections 76 and 77 traverse are different.
  • In particular, it can be seen that at core Ethernet switch 75, connections 76 and 77 converge and then immediately diverge. Despite the common destination address, core Ethernet switch 75 is able to differentiate frames belonging to connection 76 from frames belonging to connection 77 (and to forward them accordingly) on the basis of their different VLAN tags. Thus, data traffic in connection 76 has the VLAN tag 2, for example, whereas data traffic in connection 77 has the VLAN tag 1.
  • In FIG. 8, connections 80 and 82 have both the same source address (edge Ethernet switch 71—PE1) and are given the same VLAN tag (in this case the VLAN tag is 1), but have different destination addresses (connection 80 has edge Ethernet switch 73—PE3 while connection 82 has edge Ethernet switch 74—PE4). Again, the routes that connections 80 and 82 traverse are different. In particular, it can be seen that at core Ethernet switch 75, connections 80 and 82 converge and then follow the same path before diverging towards their destination points. Despite the common VLAN tags, core Ethernet switch 75 is able to differentiate frames belonging to connection 76 from frames belonging to connection 77 (and to forward them accordingly) on the basis of their different destination addresses.
  • From FIGS. 8 and 9 it can be seen that, differentiation between Ethernet frames belonging to different connections is achieved according to the combination of destination address and VLAN tag. A difference in either may be used to achieve differential forwarding required for connections.
  • FIG. 9 shows how lack of differentiation in the combination of VLAN tag and destination address necessitates convergence between connections. In FIG. 9, connections 90 and 92 have the same destination address (edge Ethernet switch 73—PE3), and are given the same VLAN tag (in this case the VLAN tag is 1), but have different source address (connection 90 has edge Ethernet switch 71—PE1 while connection 92 has edge Ethernet switch 72—PE2). Again, the routes that connections 90 and 92 traverse are different, but this is only because the data traffic is injected into the carrier network from different ingress points—ie edge Ethernet switches 71 and 72. Once the routes converge at core Ethernet switch 75, they stay converged until their destination at edge Ethernet switch 73. This is because they have the same destination address and VLAN tag and there is no way of differentiating them on the basis of the combination of destination address and VLAN tag. However, it should be noted that one (or both) of the data traffic flows may be re-routed by simply provisioning a new connection with a different VLAN tag and then using that VLAN tag in the MAC header of the Ethernet frames at the ingress point. This re-routing of data flows is hitless since the new connection may be established contemporaneously with the old connection and new Ethernet frames directed into the new connection while earlier frames are still in transit over the old connection. Thus, re-routing may occur without requiring any re-ordering of frames at the destination.
  • So far, only the establishment of point-to-point (ie unicast) connections have been described. However, according to the present invention, point-to-multipoint or multipoint-to-multipoint connections may also be established across Ethernet networks as will now be briefly described. Conventional Ethernet switches are capable of multicast service. Typically this is achieved by configuring the forwarding table with more than one output port (but not necessarily all output ports) for a given multicast destination address. According to the present invention, for relatively small scale multicast operation, a point-to-multipoint connection may be configured as described above but using a combination of VLAN tag and multicast address mapping to more than one output port (but not necessarily all output ports) of selected Ethernet switches. However, this approach is only suitable for relatively small scale multicast operation.
  • According to the present invention, where a carrier network wishes to support a large number of point-to-multipoint or multipoint-to-multipoint connections, Resilient Packet Ring (RPR) are emulated over the Ethernet MAC addressed network using multiple unicast connections established as described above. The following description is given in the context of a virtual private network (VPN) service, i.e. where there is a limited community of interest for each data frame. Two modes of operation are envisaged: a sparse mode for many customers with few sites, and a dense mode for few customers with many sites. The detailed mechanisms are described in one of the Applicants' co-pending U.S. patent application Ser. No. 10/698,833 (Nortel Networks Reference 15877RO) entitled Virtual Private Networks Within A Packet Network Having A Mesh Topology which document is incorporated herein by reference. The dense and sparse modes of operation will now be briefly described with reference to FIGS. 10 and 11.
  • FIG. 10 shows a sparse mode of broadcast operation for many customers with few sites. FIG. 10 shows a part of carrier network 20 comprising a part of fully-meshed core network 100, PE-Core edge Ethernet switches 104 a to d and PE-Edge edge Ethernet switches 102. Broadcast traffic 106 a is received at PE-Core switch 104 b from a customer site. Note that this traffic is broadcast within the context of a particular customer VPN, but is multicast within the context of the carrier network as a whole. The traffic is encapsulated and placed onto an RPR emulated by 4 unidirectional connections 108 a to d. The four connections are established as point-to-point connections as described above. The traffic is forwarded across each connection in turn until it reaches the start point again at PE-Core switch 104 b. On receipt of an encapsulated frame, each endpoint of the four connections determines whether to process the frame for distribution to the customer via PE-Edge edge Ethernet switches 102 to which it is connected. This is done on the basis of broadcast destination addresses contained in the frames, and the VPN membership of customer sites attached to these Ethernet switches. Processing the frames involves decapsulating them and replicating them as required to one or more of PE-Edge edge Ethernet switches 102. It can be seen that no bandwidth need be dedicated to broadcast traffic in the sparse mode of operation since the four point-to-point connections may be trunked—ie they may be used to carry non-broadcast data and other customer's data, whether broadcast or not.
  • FIG. 11 shows a dense mode of broadcast operation for few customers with many sites. FIG. 11 shows a part of carrier network 20 comprising a part of fully-meshed core network 100, PE-Core edge Ethernet switches 104 a to d and PE-Edge edge Ethernet switches 102 as with FIG. 10. Broadcast traffic 110 a is received at PE-Core switch 104 b from a customer site. Note, as above, that this traffic is broadcast within the context of a particular customer VPN, but is multicast within the context of the carrier network as a whole. The traffic is encapsulated and forwarded over a uni-directional connection 110 b to a core switch 116 a. Uni-directional connection 110 b may be trunked. At core switch 116 a, the traffic is forwarded in over a bi-directional RPR 112 emulated by connections between core switches 116 a to d using a bidirectional connection between each pair of adjacent nodes. The RPR is dedicated to a particular customer's broadcast traffic and is not trunked. This is achieved by using a unique VLAN tag for forwarding in the RPR.
  • The traffic is forwarded around RPR 112 to each of the core switches 116 a to d in one direction or the other, whichever is shortest for each respective core switch. Each core switch broadcasts the received frames over uni-directional connections 114 a so that each of PE-Core switches 104 a to d receives the traffic. Then, as with the sparse mode of broadcast operation described above, each PE-Core switch determines whether to process the frame for distribution to the customer via PE-Edge edge Ethernet switches 102 to which it is connected. This is done on the basis of broadcast destination addresses contained in the frames and involves decapsulating and replicating them as required to one or more of PE-Edge switches 102 for onward transmission to the customer sites.
  • It has been described above how connections may be established over a meshed Ethernet carrier network through configuring forwarding tables in network nodes and how data may be forwarded over those connections. The reader will appreciate that connections may be removed by deleting the configuration data from every node over which the connection was established. It is important that all such configuration data is removed to avoid network failure or inefficiency. As described above, the default behaviour of Ethernet switches on receiving a frame addressed to an unknown destination (ie where there is no forwarding state configured for that destination address) is to broadcast the frame out on all output ports. In simply—connected networks this behaviour is appropriate. However, with a meshed topology, this behaviour can be catastrophic. Through partial removal of connections (in particular where configuration data is left at ingress points of a connection but deleted at points further along the connections towards or including the egress point), it remains possible that Ethernet frames for the PE may enter the network but arrive at a point where there is no configuration data for forwarding them, resulting in undesirable broadcast behaviour. Furthermore, partial removal of connections may leave forwarding loops configured by accident.
  • One solution to the problem of partial removal of connections is to alter the behaviour of the Ethernet switches forming the carrier network so that instead of broadcasting unknown traffic, they discard packets and possibly issue an alarm, log or count the discarded packets. However, altering the basic behaviour of Ethernet switches may require a hardware modification. While possible, this is not preferable. However, conventional Ethernet switches generally provide a software configurable function called rate limitation. Preferably, at all or most switches of the carrier rate limitation is used to set a rate of zero, or a low rate if zero is not possible, for broadcast traffic including broadcast-on-unknown traffic.
  • Where this is not possible, other pre-emptive approaches to minimising the problems of partial removal of connections may be used. One approach is to use block lists. Conventional Ethernet switches provide a block list (typically of limited length) which may be used to specify certain destination MAC addresses such that received Ethernet frames addressed to these blocked address will be discarded without forwarding. By blocking, at all or most nodes of the network, the MAC addresses of many (but not all) MAC addresses of provider edge nodes it is possible to minimise the potential dangers of partial removal of connections without over restricting the carrier's flexibility in establishing connections across the network. Notably, it is necessary to block different MAC address at different nodes of the network. Typically, at a given node, the block list will include only the MAC address for provider edge nodes to which no connections are likely to be established through that node. This approach is not easily scaleable with large networks (the limited number of entries in block lists may be exhausted by large numbers of provider edge nodes). However, note that to prevent loops it is only necessary to block rogue frames at one node in any loop. Thus, it is possible to “spread” the blocked destination addresses more thinly across the network and still provide a degree of protection from loops thereby making more efficient use of the limited capacity of block lists.
  • While it is the use of VLAN tags in the present invention that enables flexibility in establishing connections across the network, the failure to remove VLAN state fully leaves the potential for looping of traffic. In particular, the problem will arise where a logical loop is left configured for any single given VLAN tag—ie the output ports of nodes defining a physical loop are left configured with membership of any single VLAN. Thus, another pre-emptive approach to minimising the problems of partial removal of connections is to allocate connections to or from neighbouring or nearby provider edge nodes using mutually exclusive VLAN tag pools. Thus, for example all connections to or from provider edge node PE1 will be guaranteed to have a different VLAN tag to those to or from neighbouring provider edge node PE2. In this way, VLAN loops including both PE1 and PE2 cannot accidentally be formed through the partial removal of connections since by definition any state left configured in PE1 and PE2 will use different VLAN tags. This approach may be generalised by allocating connections to or from n adjacent provider edge nodes using n mutually exclusive VLAN tag pools. n is chosen to be sufficiently large to segregate use of VLAN tag pools as much as possible while providing sufficient flexibility in connection establishment to or from any particular provider edge node (remembering that there are only 4094 possible VLAN tags). With smaller carrier networks it may be possible for each provider edge node to use a different VLAN tag pool. However, with larger carrier networks it will be necessary to re-use VLAN tag pools at topologically distant provider edge nodes otherwise flexibility in connection establishment will be compromised though VLAN tag pools being too small.
  • It will be appreciated that combinations of the above approaches to minimising the problems of partial removal of connections may be employed.
  • While embodiments have been described above with reference to the use of VLAN tags for enabling flexibility in establishing and differential forwarding of data traffic associated with different connections, the reader will appreciate that other tags or identifiers may be used.
  • Also, while embodiments have been described above with reference Ethernet networks and Ethernet frames, to the reader will appreciate that the present invention applies in general to any frame-based, packet-based or cell-based switching network whether at OSI layer 2 or layer 3 network. And to data structures including frames, packets and cells. In the following claims, the term frame-based network, or cognate terms, shall denote any such switching network and the term frame, or cognate terms, shall denote any such data structure.
  • The reader will appreciate that the methods described above may be implemented in the form of hardware or software operating on conventional data processing hardware.

Claims (29)

1. A method of establishing connections in a frame-based network, the method comprising the step of:
configuring, in one or more nodes of the network, first mappings for use in forwarding data frames, the first mappings being from a combination of:
a) a first destination address corresponding to a first destination node of the network, and
b) a first identifier,
the first mappings being to a selected output port of, or to respective selected output ports of each of, the one or more nodes, thereby establishing at least part of a first connection through the one or more nodes to the first destination node.
2. A method according to claim 1 comprising the further step of:
configuring, in at least one of the nodes, a second mapping for use in forwarding data frames, the second mapping being from a combination of:
a) a second destination address corresponding to a second destination node of the network, and
b) a second identifier,
the second mapping being to a selected output port of the at least one node, thereby establishing at least part of a second connection through the at least one node to the second destination node,
the selected output ports of the at least one node being different for the first and second mappings, thereby enabling, at the at least one node,
differential forwarding of data frames associated with the first and second connections.
3. A method according to claim 2, wherein the first and second destination addresses and the first and second destination nodes are the same.
4. A method according to claim 2, wherein the first and second identifiers are the same.
5. A method according to claim 2, wherein the at least one node associates data frames with one of the first and second connections in dependence on a destination address and identifier of the frame.
6. A method according to claim 1, wherein the network is an Ethernet network and the one or more nodes are Ethernet switches.
7. A method according to claim 6, wherein the identifier is a VLAN tag.
8. A method according to claim 1, wherein the configuration is performed by a control plane of the network.
9. A method according to claim 8, wherein the control plane is ASON/ASTN.
10. A method according to claim 1, wherein the network is at least partially meshed.
11. A frame-based communications network comprising one or more nodes arranged to perform the method of claim 1.
12. Software arranged to perform the method of claim 1.
13. A connection controller for establishing connections in a frame-based network, the connection controller comprising:
a signal generator capable of generating a first signal for configuring, in a transport node of the network, a first mapping for use in forwarding data frames, the first mapping being from a combination of:
a) a first destination address corresponding to a first destination node of the network, and
b) a first identifier,
the first mapping being to a selected output port of the transport node, the first signal thereby establishing at least part of a first connection through the transport node to the first destination node.
14. A connection controller according to claim 13, wherein the signal generator is capable of generating a second signal for configuring, in the transport node of the network, a second mapping for use in forwarding data frames, the second mapping being from a combination of:
a) a second destination address corresponding to a second destination node of the network, and
b) a second identifier,
the second mapping being to a selected output port of the transport node, the second signal thereby establishing at least part of a second connection through the transport node to the second destination node,
the selected output ports of the transport node being different for the first and second mappings, the first and second signals thereby enabling, at the transport node, differential forwarding of data frames associated with the first and second connections.
15. A connection controller according to claim 14, wherein the first and second destination addresses and the first and second destination nodes are the same.
16. A connection controller according to claim 14, wherein the first and second identifiers are the same.
17. A connection controller according to claim 13, wherein the network is an Ethernet network and the transport node is an Ethernet switch.
18. A connection controller according to claim 17, wherein the identifier is a VLAN tag.
19. A connection controller according to claim 13, wherein the network is at least partially meshed.
20. A connection controller according to claim 13 physically co-located with the transport node.
21. A frame-based network comprising the connection controller of claim 13.
22. A method of establishing a connection in a frame-based network, the method comprising the steps of:
configuring forwarding information in a plurality of nodes of the network the forwarding information enabling the nodes to forward data frames in dependence on a combination of a destination address and an identifier of the data frames.
23. A method of data traffic engineering in a frame-based network, the method comprising the following steps:
establishing a first and second connections in the network passing through a common switching node of the network,
configuring the switching node to forward data frames differently in dependence on differences in either a destination address or an identifier of the data frames, thereby enabling data traffic engineering.
24. A method of establishing connections in a frame-based network, the method comprising the step of:
configuring, in each of a first plurality of nodes of the network, a first forwarding mapping from a first combination of a destination address and an identifier to a selected output port of a respective node of the first plurality of nodes.
25. A method according to claim 24 comprising the further step of:
configuring, in at least one of the first plurality of nodes, a second forwarding mapping from a second combination of a destination address and an identifier to a selected output port of the at least one node,
wherein the first and second mappings at the at least one node respectively map to different output ports of the at least one node.
26. A connection controller for establishing connections in a frame-based network, the connection controller being arranged to configure a first forwarding mapping in a transport node, the first mapping being from a first combination of a destination address and an identifier to a first output port of the transport node.
27. A connection controller according to claim 26, the connection controller being arranged to configure a second forwarding mapping in the transport node, the second mapping being from a second, different combination of a destination address and an identifier to a second, different output port of the transport node, thereby to enable differential forwarding of data frames by the transport node in dependence on a combination of a destination address and an identifier of the data frames.
28. A method of forwarding data frames in a frame-based network, the method comprising the steps of:
establishing a first connection in the network, the first connection being associated with a first combination of a destination address and an identifier, and
forwarding data frames in the network in dependence on a combination of a destination address and an identifier of the data frames.
29. A method according to claim 28, wherein the first connection is routed through a switching node having different first and second output ports connected to other nodes of the network, the method comprising the further steps of:
establishing a second connection in the network through the switching node, the second connection being associated with a second combination of a destination address and an identifier, different to the first combination, and
the switching node forwarding data frames having the first combination of a destination address and an identifier on the first output port and forwarding data frames having the second combination of a destination address and an identifier on the second output port.
US10/818,685 2004-04-06 2004-04-06 Traffic engineering in frame-based carrier networks Abandoned US20050220096A1 (en)

Priority Applications (23)

Application Number Priority Date Filing Date Title
US10/818,685 US20050220096A1 (en) 2004-04-06 2004-04-06 Traffic engineering in frame-based carrier networks
EP05732795A EP1735961B1 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
GB0716169A GB2438767B (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
KR1020137021343A KR101503629B1 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
CA002560702A CA2560702A1 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
KR1020137020348A KR20130096328A (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
DE602005017882T DE602005017882D1 (en) 2004-04-06 2005-04-06 N CARRIER NETWORKS
JP2007506833A JP5106100B2 (en) 2004-04-06 2005-04-06 Differential transfer in addressed carrier networks
AT05732795T ATE450104T1 (en) 2004-04-06 2005-04-06 DIFFERENTIAL FORWARDING IN ADDRESS-BASED CARRIER NETWORKS
US10/593,108 US8923292B2 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
KR1020067020348A KR20070005654A (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
CN2005800102574A CN1938997B (en) 2004-04-06 2005-04-06 Method, connection controller and system for differential forwarding in address-based carrier networks
PCT/GB2005/001332 WO2005099183A1 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
GB0506972A GB2422508B (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
KR1020137021341A KR20130100217A (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
US12/196,909 US8194668B2 (en) 2004-04-06 2008-08-22 Differential forwarding in address-based carrier networks
JP2011103244A JP5238847B2 (en) 2004-04-06 2011-05-02 Differential transfer in addressed carrier networks
JP2012223284A JP2013009437A (en) 2004-04-06 2012-10-05 Differential forwarding in address-based carrier networks
JP2012223285A JP2013009438A (en) 2004-04-06 2012-10-05 Differential forwarding in address-based carrier networks
US13/683,672 US8976793B2 (en) 2004-04-06 2012-11-21 Differential forwarding in address-based carrier networks
US13/683,668 US20130176906A1 (en) 2004-04-06 2012-11-21 Traffic engineering in frame-based carrier networks
JP2013096466A JP5544440B2 (en) 2004-04-06 2013-05-01 Differential transfer in addressed carrier networks
US14/478,001 US9356862B2 (en) 2004-04-06 2014-09-05 Differential forwarding in address-based carrier networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/818,685 US20050220096A1 (en) 2004-04-06 2004-04-06 Traffic engineering in frame-based carrier networks

Related Child Applications (6)

Application Number Title Priority Date Filing Date
US10/593,108 Continuation-In-Part US8923292B2 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
US10/593,108 Continuation US8923292B2 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
PCT/GB2005/001332 Continuation-In-Part WO2005099183A1 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
PCT/GB2005/001332 Continuation WO2005099183A1 (en) 2004-04-06 2005-04-06 Differential forwarding in address-based carrier networks
US59310807A Continuation-In-Part 2004-04-06 2007-05-21
US13/683,668 Continuation US20130176906A1 (en) 2004-04-06 2012-11-21 Traffic engineering in frame-based carrier networks

Publications (1)

Publication Number Publication Date
US20050220096A1 true US20050220096A1 (en) 2005-10-06

Family

ID=34592719

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/818,685 Abandoned US20050220096A1 (en) 2004-04-06 2004-04-06 Traffic engineering in frame-based carrier networks
US13/683,668 Abandoned US20130176906A1 (en) 2004-04-06 2012-11-21 Traffic engineering in frame-based carrier networks
US14/478,001 Expired - Fee Related US9356862B2 (en) 2004-04-06 2014-09-05 Differential forwarding in address-based carrier networks

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/683,668 Abandoned US20130176906A1 (en) 2004-04-06 2012-11-21 Traffic engineering in frame-based carrier networks
US14/478,001 Expired - Fee Related US9356862B2 (en) 2004-04-06 2014-09-05 Differential forwarding in address-based carrier networks

Country Status (10)

Country Link
US (3) US20050220096A1 (en)
EP (1) EP1735961B1 (en)
JP (5) JP5106100B2 (en)
KR (4) KR20070005654A (en)
CN (1) CN1938997B (en)
AT (1) ATE450104T1 (en)
CA (1) CA2560702A1 (en)
DE (1) DE602005017882D1 (en)
GB (1) GB2422508B (en)
WO (1) WO2005099183A1 (en)

Cited By (167)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060007917A1 (en) * 2004-07-07 2006-01-12 Masahiro Saito Frame transfer method and edge switch
US20060215672A1 (en) * 2005-02-04 2006-09-28 Level 3 Communications, Inc. Ethernet-based systems and methods for improved network routing
US20070047540A1 (en) * 2005-08-26 2007-03-01 Nigel Bragg Forwarding table minimisation in Ethernet switches
US20070076719A1 (en) * 2005-10-05 2007-04-05 Nortel Networks Limited Provider backbone bridging - provider backbone transport internetworking
WO2007038856A1 (en) 2005-10-05 2007-04-12 Nortel Networks Limited Provider link state bridging
US20070086429A1 (en) * 2005-02-04 2007-04-19 Level 3 Communications, Inc. Systems and Methods for Network Routing in a Multiple Backbone Network Architecture
US20070098006A1 (en) * 2005-11-01 2007-05-03 Nortel Networks Limited Multilink trunking for encapsulated traffic
US20070160012A1 (en) * 2004-04-23 2007-07-12 Utstarcom Telecom Co., Ltd. Method and apparatus for multi-antenna signal transmission in rf long-distance wireless bs
US20070177597A1 (en) * 2006-02-02 2007-08-02 Yu Ju Ethernet connection-based forwarding process
US20070195832A1 (en) * 2004-04-09 2007-08-23 Utstarcom Telecom Co. Ltd. Method and system of signal transmission in base transceiver station based on remote radio head
US20070211736A1 (en) * 2006-03-13 2007-09-13 Microsoft Corporatione Connecting multi-hop mesh networks usinc MAC Bridge
WO2007087275A3 (en) * 2006-01-23 2007-12-21 Allied Telesis Inc Method and system for improving traffic distribution across a communication network
US20080062994A1 (en) * 2006-09-10 2008-03-13 Ethos Networks Ltd Method and system for relaying frames through an ethernet network and bridge therefor
WO2007113645A3 (en) * 2006-03-31 2008-04-10 Gridpoint Systems Inc Smart ethernet edge networking system
US7359383B2 (en) * 2004-03-29 2008-04-15 Hewlett-Packard Development Company, L.P. Load balancing with mesh tagging
US20080095047A1 (en) * 2006-06-29 2008-04-24 Nortel Networks Limited Method and system for looping back traffic in qiq ethernet rings and 1:1 protected pbt trunks
WO2008053252A1 (en) 2006-11-02 2008-05-08 Nortel Networks Limited Traffic engineered paths in a link state protocol controlled ethernet network
US20080151863A1 (en) * 2006-02-03 2008-06-26 Level 3 Communications Llc System and method for switching traffic through a network
WO2008091637A2 (en) 2007-01-25 2008-07-31 Hammerhead Systems, Inc. Mapping pbt and pbb-te traffic to vpls and other services
US20080267072A1 (en) * 2007-04-27 2008-10-30 Futurewei Technologies, Inc. Data Communications Network for the Management of an Ethernet Transport Network
US20080267080A1 (en) * 2007-04-27 2008-10-30 Futurewei Technologies, Inc. Fault Verification for an Unpaired Unidirectional Switched-Path
US20080270588A1 (en) * 2007-04-27 2008-10-30 Futurewei Technologies, Inc. Verifying Management Virtual Local Area Network Identifier Provisioning Consistency
US20080279196A1 (en) * 2004-04-06 2008-11-13 Robert Friskney Differential Forwarding in Address-Based Carrier Networks
EP2051450A1 (en) * 2006-08-09 2009-04-22 Huawei Technologies Co Ltd Method and system for forwarding data between a plurality of provider ethernet networks
EP2066081A1 (en) * 2007-11-30 2009-06-03 Ciena Corporation Flow control using referential tables in a carrier ethernet network
US20090161669A1 (en) * 2007-12-21 2009-06-25 Nortel Netowrks Limited Evolution of Ethernet Networks
US20090168780A1 (en) * 2007-12-31 2009-07-02 Nortel Networks Limited MPLS P node replacement using a link state protocol controlled ethernet network
WO2009105754A1 (en) * 2008-02-21 2009-08-27 Telcordia Technologies, Inc. Efficient, fault-tolerant multicast networks via network coding
US20090290537A1 (en) * 2008-05-23 2009-11-26 Nokia Siemens Networks Providing station context and mobility in a wireless local area network having a split MAC architecture
EP2141867A1 (en) * 2008-07-02 2010-01-06 Nec Corporation Communication system, network apparatus, communication recovery method for use therein, and program thereof
US20100008365A1 (en) * 2008-06-12 2010-01-14 Porat Hayim Method and system for transparent lan services in a packet network
US20100030915A1 (en) * 2008-07-31 2010-02-04 Kiefer Matthew System and method for routing commands in a modularized software system
US7729274B2 (en) 2006-03-31 2010-06-01 Ciena Corporation Smart ethernet mesh edge device
WO2010060373A1 (en) * 2008-11-26 2010-06-03 华为技术有限公司 Method, apparatus and system for establishing virtual local area network connection
US20100135307A1 (en) * 2008-12-01 2010-06-03 Fujitsu Limited Switch
US20100188968A1 (en) * 2007-06-19 2010-07-29 Zte Corporation Method for processing ether rig net message and an ether rig net protection system using the method
US20100238813A1 (en) * 2006-06-29 2010-09-23 Nortel Networks Limited Q-in-Q Ethernet rings
WO2010115260A1 (en) * 2009-04-09 2010-10-14 Nortel Networks Limited Enabling an ethernet ring network to scalably support a hub-and-spoke connectivity model
US20110022721A1 (en) * 2009-07-24 2011-01-27 Wael William Diab Method and system for packetizing data for servicing traffic end-to-end
CN102027714A (en) * 2008-05-16 2011-04-20 微软公司 Performing networking tasks based on destination networks
US20110141891A1 (en) * 2009-12-10 2011-06-16 Verizon Patent And Licensing, Inc. Ldp extension for forwarding path congestion notification
US20110142047A1 (en) * 2009-12-10 2011-06-16 Electronics and Telecommunications Rearch Institute Backbone edge switching apparatus and packet processing method of the backbone edge switching apparatus
US20110261697A1 (en) * 2010-04-22 2011-10-27 International Business Machines Corporation Network data congestion management system
US20120076014A1 (en) * 2010-09-27 2012-03-29 Ciena Corporation Method and apparatus for traffic engineering in shortest path bridged networks
US8274989B1 (en) 2006-03-31 2012-09-25 Rockstar Bidco, LP Point-to-multipoint (P2MP) resilience for GMPLS control of ethernet
US20130094513A1 (en) * 2011-10-12 2013-04-18 Fujitsu Limited Relay apparatus and control method
US20130103818A1 (en) * 2011-10-25 2013-04-25 Teemu Koponen Physical controller
US20130176906A1 (en) * 2004-04-06 2013-07-11 Rockstar Bidco, LP Traffic engineering in frame-based carrier networks
US20130286921A1 (en) * 2012-04-30 2013-10-31 Gopal Agarwal System and method for mitigating multicast message duplication in a wireless network
US20130343204A1 (en) * 2011-02-19 2013-12-26 Deutsche Telekom Ag Looping mpls paths at forwarding level for connectionless mpls networks
US20140112659A1 (en) * 2011-06-29 2014-04-24 Nippon Telegraph And Telephone Corporation Olt and frame transfer control method
US8787394B2 (en) 2011-02-01 2014-07-22 Ciena Corporation Separate ethernet forwarding and control plane systems and methods with interior gateway route reflector for a link state routing system
US8854955B2 (en) 2012-11-02 2014-10-07 Ciena Corporation Mesh restoration and bandwidth allocation systems and methods for shared risk connection groups
US20140348162A1 (en) * 2012-09-07 2014-11-27 International Business Machines Corporation Overlay network capable of supporting storage area network (san) traffic
WO2014201040A1 (en) * 2013-06-10 2014-12-18 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
US8948055B2 (en) 2012-11-02 2015-02-03 Ciena Corporation Resilient interworking of shortest path bridging and Ethernet virtual private networks
CN104518967A (en) * 2013-09-30 2015-04-15 华为技术有限公司 Routing method, equipment and system
US9020888B1 (en) 2012-04-04 2015-04-28 Nectar Services Corp. Data replicating systems and data replication methods
US9094337B2 (en) 2012-12-21 2015-07-28 Cieno Corporation Source identification preservation in multiprotocol label switching networks
US9118590B2 (en) 2004-07-02 2015-08-25 Rpx Clearinghouse Llc VLAN support of differentiated services
US9143445B2 (en) 2010-06-08 2015-09-22 Brocade Communications Systems, Inc. Method and system for link aggregation across multiple switches
US9154416B2 (en) 2012-03-22 2015-10-06 Brocade Communications Systems, Inc. Overlay tunnel in a fabric switch
US9178717B1 (en) * 2011-04-07 2015-11-03 Adtran, Inc. Systems and methods for enabling leaf isolation in a multi-node tree network
US9270572B2 (en) 2011-05-02 2016-02-23 Brocade Communications Systems Inc. Layer-3 support in TRILL networks
US9276768B2 (en) 2008-05-23 2016-03-01 Nokia Solutions And Networks Oy Providing station context and mobility in a wireless local area network having a split MAC architecture
US9288104B2 (en) 2011-10-25 2016-03-15 Nicira, Inc. Chassis controllers for converting universal flows
US9306910B2 (en) 2009-07-27 2016-04-05 Vmware, Inc. Private allocated networks over shared communications infrastructure
US9350564B2 (en) 2011-06-28 2016-05-24 Brocade Communications Systems, Inc. Spanning-tree based loop detection for an ethernet fabric switch
US9350680B2 (en) 2013-01-11 2016-05-24 Brocade Communications Systems, Inc. Protection switching over a virtual link aggregation
US9350696B2 (en) 2011-08-17 2016-05-24 Nicira, Inc. Handling NAT in logical L3 routing
US9374301B2 (en) 2012-05-18 2016-06-21 Brocade Communications Systems, Inc. Network feedback in software-defined networks
US9385954B2 (en) 2014-03-31 2016-07-05 Nicira, Inc. Hashing techniques for use in a network environment
US9401818B2 (en) 2013-03-15 2016-07-26 Brocade Communications Systems, Inc. Scalable gateways for a fabric switch
US9401872B2 (en) 2012-11-16 2016-07-26 Brocade Communications Systems, Inc. Virtual link aggregations across multiple fabric switches
US9401861B2 (en) 2011-06-28 2016-07-26 Brocade Communications Systems, Inc. Scalable MAC address distribution in an Ethernet fabric switch
US9407580B2 (en) 2013-07-12 2016-08-02 Nicira, Inc. Maintaining data stored with a packet
US9413691B2 (en) 2013-01-11 2016-08-09 Brocade Communications Systems, Inc. MAC address synchronization in a fabric switch
US9444651B2 (en) 2011-08-17 2016-09-13 Nicira, Inc. Flow generation from second level controller to first level controller to managed switching element
US9450870B2 (en) 2011-11-10 2016-09-20 Brocade Communications Systems, Inc. System and method for flow management in software-defined networks
US9455935B2 (en) 2010-06-08 2016-09-27 Brocade Communications Systems, Inc. Remote port mirroring
US9461840B2 (en) 2010-06-02 2016-10-04 Brocade Communications Systems, Inc. Port profile management for virtual cluster switching
US9461911B2 (en) 2010-06-08 2016-10-04 Brocade Communications Systems, Inc. Virtual port grouping for virtual cluster switching
US9485148B2 (en) 2010-05-18 2016-11-01 Brocade Communications Systems, Inc. Fabric formation for virtual cluster switching
US9524173B2 (en) 2014-10-09 2016-12-20 Brocade Communications Systems, Inc. Fast reboot for a switch
US9544219B2 (en) 2014-07-31 2017-01-10 Brocade Communications Systems, Inc. Global VLAN services
US9548873B2 (en) 2014-02-10 2017-01-17 Brocade Communications Systems, Inc. Virtual extensible LAN tunnel keepalives
US9548926B2 (en) 2013-01-11 2017-01-17 Brocade Communications Systems, Inc. Multicast traffic load balancing over virtual link aggregation
US9548924B2 (en) 2013-12-09 2017-01-17 Nicira, Inc. Detecting an elephant flow based on the size of a packet
US9565099B2 (en) 2013-03-01 2017-02-07 Brocade Communications Systems, Inc. Spanning tree in fabric switches
US9565028B2 (en) 2013-06-10 2017-02-07 Brocade Communications Systems, Inc. Ingress switch multicast distribution in a fabric switch
US9565113B2 (en) 2013-01-15 2017-02-07 Brocade Communications Systems, Inc. Adaptive link aggregation and virtual link aggregation
US9571386B2 (en) 2013-07-08 2017-02-14 Nicira, Inc. Hybrid packet processing
US9569368B2 (en) 2013-12-13 2017-02-14 Nicira, Inc. Installing and managing flows in a flow table cache
US9602398B2 (en) 2013-09-15 2017-03-21 Nicira, Inc. Dynamically generating flows with wildcard fields
US9602430B2 (en) 2012-08-21 2017-03-21 Brocade Communications Systems, Inc. Global VLANs for fabric switches
US9608833B2 (en) 2010-06-08 2017-03-28 Brocade Communications Systems, Inc. Supporting multiple multicast trees in trill networks
US9628336B2 (en) 2010-05-03 2017-04-18 Brocade Communications Systems, Inc. Virtual cluster switching
US9628407B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Multiple software versions in a switch group
US9628293B2 (en) 2010-06-08 2017-04-18 Brocade Communications Systems, Inc. Network layer multicasting in trill networks
US9626255B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Online restoration of a switch snapshot
US9697032B2 (en) 2009-07-27 2017-07-04 Vmware, Inc. Automated network configuration of virtual machines in a virtual lab environment
US9699029B2 (en) 2014-10-10 2017-07-04 Brocade Communications Systems, Inc. Distributed configuration management in a switch group
US9699117B2 (en) 2011-11-08 2017-07-04 Brocade Communications Systems, Inc. Integrated fibre channel support in an ethernet fabric switch
US9716672B2 (en) 2010-05-28 2017-07-25 Brocade Communications Systems, Inc. Distributed configuration management for virtual cluster switching
US9729387B2 (en) 2012-01-26 2017-08-08 Brocade Communications Systems, Inc. Link aggregation in software-defined networks
US9736085B2 (en) 2011-08-29 2017-08-15 Brocade Communications Systems, Inc. End-to end lossless Ethernet in Ethernet fabric
US9742881B2 (en) 2014-06-30 2017-08-22 Nicira, Inc. Network virtualization using just-in-time distributed capability for classification encoding
US9742693B2 (en) 2012-02-27 2017-08-22 Brocade Communications Systems, Inc. Dynamic service insertion in a fabric switch
US9769016B2 (en) 2010-06-07 2017-09-19 Brocade Communications Systems, Inc. Advanced link tracking for virtual cluster switching
US9800471B2 (en) 2014-05-13 2017-10-24 Brocade Communications Systems, Inc. Network extension groups of global VLANs in a fabric switch
US9806949B2 (en) 2013-09-06 2017-10-31 Brocade Communications Systems, Inc. Transparent interconnection of Ethernet fabric switches
US9807007B2 (en) 2014-08-11 2017-10-31 Brocade Communications Systems, Inc. Progressive MAC address learning
US9807005B2 (en) 2015-03-17 2017-10-31 Brocade Communications Systems, Inc. Multi-fabric manager
US9806906B2 (en) 2010-06-08 2017-10-31 Brocade Communications Systems, Inc. Flooding packets on a per-virtual-network basis
US9807031B2 (en) 2010-07-16 2017-10-31 Brocade Communications Systems, Inc. System and method for network configuration
US9848040B2 (en) 2010-06-07 2017-12-19 Brocade Communications Systems, Inc. Name services for virtual cluster switching
US9900410B2 (en) 2006-05-01 2018-02-20 Nicira, Inc. Private ethernet overlay networks over a shared ethernet in a virtual environment
US9912612B2 (en) 2013-10-28 2018-03-06 Brocade Communications Systems LLC Extended ethernet fabric switches
US9912614B2 (en) 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
US20180069727A1 (en) * 2010-09-10 2018-03-08 Extreme Networks, Inc. Access network dual path connectivity
US9923760B2 (en) 2015-04-06 2018-03-20 Nicira, Inc. Reduction of churn in a network control system
US9942097B2 (en) 2015-01-05 2018-04-10 Brocade Communications Systems LLC Power management in a network of interconnected switches
US9967199B2 (en) 2013-12-09 2018-05-08 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US9996467B2 (en) 2013-12-13 2018-06-12 Nicira, Inc. Dynamically adjusting the number of flows allowed in a flow table cache
US10003552B2 (en) 2015-01-05 2018-06-19 Brocade Communications Systems, Llc. Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches
US10033579B2 (en) 2012-04-18 2018-07-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
US10038592B2 (en) 2015-03-17 2018-07-31 Brocade Communications Systems LLC Identifier assignment to a new switch in a switch group
US10063473B2 (en) 2014-04-30 2018-08-28 Brocade Communications Systems LLC Method and system for facilitating switch virtualization in a network of interconnected switches
US10069639B2 (en) 2015-07-28 2018-09-04 Ciena Corporation Multicast systems and methods for segment routing
US10171303B2 (en) 2015-09-16 2019-01-01 Avago Technologies International Sales Pte. Limited IP-based interconnection of switches with a logical chassis
US10181993B2 (en) 2013-07-12 2019-01-15 Nicira, Inc. Tracing network packets through logical and physical networks
US10193806B2 (en) 2014-03-31 2019-01-29 Nicira, Inc. Performing a finishing operation to improve the quality of a resulting hash
US10200306B2 (en) 2017-03-07 2019-02-05 Nicira, Inc. Visualization of packet tracing operation results
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US10237090B2 (en) 2016-10-28 2019-03-19 Avago Technologies International Sales Pte. Limited Rule-based network identifier mapping
US10277464B2 (en) 2012-05-22 2019-04-30 Arris Enterprises Llc Client auto-configuration in a multi-switch link aggregation
US20190166636A1 (en) * 2017-11-27 2019-05-30 Cypress Semiconductor Corporation Load balance for dual interface automotive wi-fi controllers for p2p devices
US10367736B2 (en) * 2013-03-15 2019-07-30 Cisco Technology, Inc. Extended tag networking
US10439929B2 (en) 2015-07-31 2019-10-08 Avago Technologies International Sales Pte. Limited Graceful recovery of a multicast-enabled switch
US10454760B2 (en) 2012-05-23 2019-10-22 Avago Technologies International Sales Pte. Limited Layer-3 overlay gateways
US10469342B2 (en) 2014-10-10 2019-11-05 Nicira, Inc. Logical network traffic analysis
US10476698B2 (en) 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
US10498638B2 (en) 2013-09-15 2019-12-03 Nicira, Inc. Performing a multi-stage lookup to classify packets
US10541923B2 (en) 2018-02-05 2020-01-21 Ciena Corporation Segment routing traffic engineering based on link utilization
US10579406B2 (en) 2015-04-08 2020-03-03 Avago Technologies International Sales Pte. Limited Dynamic orchestration of overlay tunnels
US10581758B2 (en) 2014-03-19 2020-03-03 Avago Technologies International Sales Pte. Limited Distributed hot standby links for vLAG
WO2020052758A1 (en) * 2018-09-13 2020-03-19 Telefonaktiebolaget Lm Ericsson (Publ) A method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices.
US10608887B2 (en) 2017-10-06 2020-03-31 Nicira, Inc. Using packet tracing tool to automatically execute packet capture operations
US10616108B2 (en) 2014-07-29 2020-04-07 Avago Technologies International Sales Pte. Limited Scalable MAC address virtualization
US10637800B2 (en) 2017-06-30 2020-04-28 Nicira, Inc Replacement of logical network addresses with physical network addresses
US10659373B2 (en) 2014-03-31 2020-05-19 Nicira, Inc Processing packets according to hierarchy of flow entry storages
US10681000B2 (en) 2017-06-30 2020-06-09 Nicira, Inc. Assignment of unique physical network addresses for logical network addresses
US10686699B2 (en) 2015-07-28 2020-06-16 Ciena Corporation Multicast systems and methods for segment routing
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller
US11178051B2 (en) 2014-09-30 2021-11-16 Vmware, Inc. Packet key parser for flow-based forwarding elements
US11190463B2 (en) 2008-05-23 2021-11-30 Vmware, Inc. Distributed virtual switch for virtualized computer systems
US11196628B1 (en) 2020-07-29 2021-12-07 Vmware, Inc. Monitoring container clusters
US11201808B2 (en) 2013-07-12 2021-12-14 Nicira, Inc. Tracing logical network packets through physical network
US11336533B1 (en) 2021-01-08 2022-05-17 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11558426B2 (en) 2020-07-29 2023-01-17 Vmware, Inc. Connection tracking for container cluster
US11570090B2 (en) 2020-07-29 2023-01-31 Vmware, Inc. Flow tracing operation in container cluster
US11677645B2 (en) 2021-09-17 2023-06-13 Vmware, Inc. Traffic monitoring
US11687210B2 (en) 2021-07-05 2023-06-27 Vmware, Inc. Criteria-based expansion of group nodes in a network topology visualization
US11711278B2 (en) 2021-07-24 2023-07-25 Vmware, Inc. Visualization of flow trace operation across multiple sites
US11736436B2 (en) 2020-12-31 2023-08-22 Vmware, Inc. Identifying routes with indirect addressing in a datacenter
US11870685B2 (en) 2019-03-01 2024-01-09 Nec Corporation Packet capsulation method and packet capsulation device
US11924080B2 (en) 2020-01-17 2024-03-05 VMware LLC Practical overlay network latency measurement in datacenter

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0608881D0 (en) 2006-05-05 2006-06-14 Nortel Networks Ltd Interworking point to point protocol for digital subscriber line access with ethernet connections in the aggregation network
US8149837B2 (en) 2007-01-16 2012-04-03 Futurewei Technologies, Inc. Method of supporting an open provider backbone network
US8442072B2 (en) 2007-05-25 2013-05-14 Futurewei Technologies, Inc. Method of preventing transport leaks in hybrid switching networks by extension of the link layer discovery protocol (LLDP)
GB0800478D0 (en) 2008-01-11 2008-02-20 Nortel Networks Ltd Improved loop avoidance for multicast transport networks
GB0802371D0 (en) 2008-02-09 2008-03-12 Nortel Networks Ltd PLSB-VPLS interworking
CN101960790B (en) * 2008-02-27 2014-07-30 艾利森电话股份有限公司 A system and method of demultiplexing provider backbone bridging traffic engineering instances
US8005016B2 (en) * 2008-10-28 2011-08-23 Nortel Networks Limited Provider link state bridging (PLSB) computation method
US9100269B2 (en) 2008-10-28 2015-08-04 Rpx Clearinghouse Llc Provisioned provider link state bridging (PLSB) with routed back-up
US7948993B2 (en) * 2009-04-24 2011-05-24 Telefonaktiebolaget L M Ericsson (Publ) Address resolution optimization procedure to effect a gradual cutover from a provider bridge network to a VPLS or provider backbone bridging network
US9025465B2 (en) * 2009-10-28 2015-05-05 Tellabs Operations, Inc. Methods and apparatuses for performing protection switching without using Y.1731-based automatic protection switching (APS) messages
CN102170384B (en) * 2011-04-15 2014-06-11 杭州华三通信技术有限公司 Method for processing faults of intersected Ethernet ring and nodes
KR101238027B1 (en) * 2011-06-24 2013-02-27 에스케이텔레콤 주식회사 System and method for simultaneously transmitting data in heterogeneous network
US8787208B2 (en) * 2011-07-29 2014-07-22 Indian Institute Of Technology Bombay Method and apparatus for allocating backbone VLAN identifiers
US8971334B2 (en) * 2011-08-02 2015-03-03 Telefonaktiebolaget L M Ericsson (Publ) Packet broadcast mechanism in a split architecture network
CN102801564B (en) * 2012-08-17 2015-06-03 盛科网络(苏州)有限公司 Remote management method of network equipment in hierarchical network application
CN103795631B (en) * 2012-10-30 2017-03-15 杭州华三通信技术有限公司 Deploy the flow forwarding method and equipment in the network of Ethernet virtual link
US20140153443A1 (en) * 2012-11-30 2014-06-05 International Business Machines Corporation Per-Address Spanning Tree Networks
US9521065B1 (en) * 2013-06-20 2016-12-13 EMC IP Holding Company LLC Enhanced VLAN naming
CN103457820B (en) * 2013-08-27 2018-06-26 华为技术有限公司 The implementation method and device of hierarchical virtual private local area network service
US10270719B2 (en) 2013-09-10 2019-04-23 Illinois Tool Works Inc. Methods for handling data packets in a digital network of a welding system
CN103997628A (en) * 2014-06-09 2014-08-20 中国能源建设集团广东省电力设计研究院 Method and communication structure for optimizing thermal power plant information system
WO2016116939A1 (en) * 2015-01-19 2016-07-28 Hewlett-Packard Development Company, L.P. Engines to prune overlay network traffic
TWI580216B (en) * 2015-01-19 2017-04-21 瑞昱半導體股份有限公司 Network system and method of detecting and recording abnormal network connection
CN106941437B (en) * 2016-01-04 2020-11-17 中兴通讯股份有限公司 Information transmission method and device
US10476700B2 (en) 2016-08-04 2019-11-12 Cisco Technology, Inc. Techniques for interconnection of controller- and protocol-based virtual networks
US9992114B1 (en) * 2016-12-02 2018-06-05 Adtran, Inc. Selective MAC address learning
JP2018174473A (en) * 2017-03-31 2018-11-08 三菱電機株式会社 Network controller and network system
CN109151830B (en) * 2017-06-15 2022-07-29 华为技术有限公司 Method, device, equipment and system for frequency spectrum arrangement
US10630508B2 (en) * 2017-10-31 2020-04-21 Level 3 Communications, Llc Dynamic customer VLAN identifiers in a telecommunications network
CN107864302B (en) * 2017-11-22 2020-09-08 泰康保险集团股份有限公司 Telephone sales service method, device and system
GB201802347D0 (en) * 2018-02-13 2018-03-28 Nchain Holdings Ltd Computer-implemented system and method
US20220060498A1 (en) * 2020-08-20 2022-02-24 Intrusion, Inc. System and method for monitoring and securing communications networks and associated devices
US11411911B2 (en) * 2020-10-26 2022-08-09 Mellanox Technologies, Ltd. Routing across multiple subnetworks using address mapping

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5485455A (en) * 1994-01-28 1996-01-16 Cabletron Systems, Inc. Network having secure fast packet switching and guaranteed quality of service
US5560038A (en) * 1994-07-22 1996-09-24 Network Peripherals, Inc. Apparatus for translating frames of data transferred between heterogeneous local area networks
US5959990A (en) * 1996-03-12 1999-09-28 Bay Networks, Inc. VLAN frame format
US6151324A (en) * 1996-06-03 2000-11-21 Cabletron Systems, Inc. Aggregation of mac data flows through pre-established path between ingress and egress switch to reduce number of number connections
US6181699B1 (en) * 1998-07-01 2001-01-30 National Semiconductor Corporation Apparatus and method of assigning VLAN tags
US6249521B1 (en) * 1997-02-14 2001-06-19 Advanced Micro Devices, Inc. Method and apparatus for creating a port vector
US20020191250A1 (en) * 2001-06-01 2002-12-19 Graves Alan F. Communications network for a metropolitan area
US6515993B1 (en) * 1999-05-28 2003-02-04 Advanced Micro Devices, Inc. Method and apparatus for manipulating VLAN tags
US20030037163A1 (en) * 2001-08-15 2003-02-20 Atsushi Kitada Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider
US20030067928A1 (en) * 2001-09-24 2003-04-10 Gonda Rumi Sheryar Method for supporting ethernet MAC circuits
US6563832B1 (en) * 1998-11-30 2003-05-13 Cisco Technology, Inc. Token ring bridge distributed in a switched fabric
US20030142674A1 (en) * 2002-01-30 2003-07-31 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
US20030152075A1 (en) * 2002-02-14 2003-08-14 Hawthorne Austin J. Virtual local area network identifier translation in a packet-based network
US20030214962A1 (en) * 2002-05-15 2003-11-20 Mark Allaye-Chan Method and apparatus for bandwidth optimization in network ring topology
US20030237002A1 (en) * 2002-06-25 2003-12-25 Hitachi, Ltd. Network node and communication system
US6788681B1 (en) * 1999-03-16 2004-09-07 Nortel Networks Limited Virtual private networks and methods for their operation
US6789121B2 (en) * 2002-02-08 2004-09-07 Nortel Networks Limited Method of providing a virtual private network service through a shared network, and provider edge device for such network
US20040223501A1 (en) * 2001-12-27 2004-11-11 Mackiewich Blair T. Method and apparatus for routing data frames
US6990106B2 (en) * 2001-03-19 2006-01-24 Alcatel Classification and tagging rules for switching nodes
US7046680B1 (en) * 2000-11-28 2006-05-16 Mci, Inc. Network access system including a programmable access device having distributed service control
US7079544B2 (en) * 2000-06-02 2006-07-18 Hitachi, Ltd. Apparatus and method for interworking between MPLS network and non-MPLS network
US7492768B2 (en) * 2002-12-24 2009-02-17 Electronics And Telecommunications Research Institute System and method for VLAN configuration of E-PON, and recording medium with stored program thereof
US7548541B2 (en) * 2002-06-04 2009-06-16 Alcatel-Lucent Usa Inc. Managing VLAN traffic in a multiport network node using customer-specific identifiers
US7558273B1 (en) * 2003-12-23 2009-07-07 Extreme Networks, Inc. Methods and systems for associating and translating virtual local area network (VLAN) tags

Family Cites Families (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2003152A (en) * 1934-07-17 1935-05-28 Warner Swasey Co Stock feeding and gripping device
US6212089B1 (en) 1996-03-19 2001-04-03 Hitachi, Ltd. Semiconductor memory device and defect remedying method thereof
US5546038A (en) 1995-06-30 1996-08-13 Harris Corporation SCR inductor transient clamp
US5978379A (en) 1997-01-23 1999-11-02 Gadzoox Networks, Inc. Fiber channel learning bridge, learning half bridge, and protocol
US6266705B1 (en) 1998-09-29 2001-07-24 Cisco Systems, Inc. Look up mechanism and associated hash table for a network switch
US6396811B1 (en) 1998-12-17 2002-05-28 Telefonaktiebolaget Lm Ericsson Segmented performance monitoring of multi-stage ATM node
AU2224900A (en) 1999-01-08 2000-07-24 Nortel Networks Limited Dynamic assignment of traffic classes to a priority queue in a packet forwardingdevice
US6556541B1 (en) * 1999-01-11 2003-04-29 Hewlett-Packard Development Company, L.P. MAC address learning and propagation in load balancing switch protocols
US6754211B1 (en) 1999-12-01 2004-06-22 Mosaid Technologies, Inc. Method and apparatus for wire speed IP multicast forwarding
EP1111862A1 (en) 1999-12-23 2001-06-27 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Method and devices to provide a defined quality of service in a packet switched communication network
US6934260B1 (en) * 2000-02-01 2005-08-23 Advanced Micro Devices, Inc. Arrangement for controlling learning of layer 3 network addresses in a network switch
US7075926B2 (en) 2000-05-24 2006-07-11 Alcatel Internetworking, Inc. (Pe) Programmable packet processor with flow resolution logic
DE10123821A1 (en) 2000-06-02 2001-12-20 Ibm Switched Ethernet network has a method for assigning priorities to user groups so that a quality of service guarantee can be provided by ensuring that packets for one or more groups are given priority over other groups
DE60143600D1 (en) 2000-06-09 2011-01-20 Broadcom Corp Flexible protocol header for network switch
US7352770B1 (en) * 2000-08-04 2008-04-01 Intellon Corporation Media access control protocol with priority and contention-free intervals
US8619793B2 (en) 2000-08-21 2013-12-31 Rockstar Consortium Us Lp Dynamic assignment of traffic classes to a priority queue in a packet forwarding device
US6937576B1 (en) 2000-10-17 2005-08-30 Cisco Technology, Inc. Multiple instance spanning tree protocol
GB2369526B (en) 2000-11-24 2003-07-09 3Com Corp TCP Control packet differential service
US6839327B1 (en) 2000-12-01 2005-01-04 Cisco Technology, Inc. Method and apparatus for maintaining consistent per-hop forwarding behavior in a network using network-wide per-hop behavior definitions
US7130303B2 (en) 2001-03-15 2006-10-31 Lucent Technologies Inc. Ethernet packet encapsulation for metropolitan area ethernet networks
US6610959B2 (en) 2001-04-26 2003-08-26 Regents Of The University Of Minnesota Single-wire arc spray apparatus and methods of using same
JP4190170B2 (en) * 2001-07-27 2008-12-03 富士通株式会社 Detour route setting system
US7562396B2 (en) 2001-08-21 2009-07-14 Ecd Systems, Inc. Systems and methods for media authentication
WO2003021858A1 (en) 2001-09-04 2003-03-13 Rumi Sheryar Gonda Method for supporting sdh/sonet aps on ethernet
JP3714238B2 (en) * 2001-11-21 2005-11-09 日本電気株式会社 Network transfer system and transfer method
US7188364B2 (en) * 2001-12-20 2007-03-06 Cranite Systems, Inc. Personal virtual bridged local area networks
JP3878014B2 (en) * 2001-12-28 2007-02-07 富士通株式会社 Packet switch for interfacing LAN and WAN
KR100451794B1 (en) 2001-12-28 2004-10-08 엘지전자 주식회사 Method for Interfacing IEEE802.1p and DiffServ
JP2004140776A (en) 2002-07-12 2004-05-13 Nec Corp Frame transfer method for network and frame transfer program
US7529243B2 (en) 2002-07-16 2009-05-05 Enterasys Networks, Inc. Apparatus and method for a virtual hierarchical local area network
TWI220058B (en) 2002-08-05 2004-08-01 Macronix Int Co Ltd Method of removing HDP oxide deposition
US7339929B2 (en) 2002-08-23 2008-03-04 Corrigent Systems Ltd. Virtual private LAN service using a multicast protocol
US7453888B2 (en) 2002-08-27 2008-11-18 Alcatel Lucent Stackable virtual local area network provisioning in bridged networks
US7292581B2 (en) 2002-10-24 2007-11-06 Cisco Technology, Inc. Large-scale layer 2 metropolitan area network
US7180899B2 (en) 2002-10-29 2007-02-20 Cisco Technology, Inc. Multi-tiered Virtual Local area Network (VLAN) domain mapping mechanism
US7283465B2 (en) 2003-01-07 2007-10-16 Corrigent Systems Ltd. Hierarchical virtual private LAN service protection scheme
US7619966B2 (en) 2003-02-21 2009-11-17 Alcatel Lucent Hybrid virtual private LAN extensions
US7590114B1 (en) * 2003-03-24 2009-09-15 Marvell International Ltd Efficient IP multicast bridging in ethernet switches
US8040886B2 (en) 2003-04-08 2011-10-18 Cisco Technology, Inc. Programmable packet classification system using an array of uniform content-addressable memories
US7386630B2 (en) 2003-04-30 2008-06-10 Nokia Corporation Using policy-based management to support Diffserv over MPLS network
DE112004001256T5 (en) 2003-07-07 2006-05-18 Yazaki Corp. Transmission Capacity Allocation Method, Communication Network, and Network Resource Management Device
US7301949B2 (en) 2003-07-15 2007-11-27 Telefonaktiebolaget Lm Ericsson (Publ) Arrangements for connection-oriented transport in a packet switched communications network
JP4080970B2 (en) 2003-07-30 2008-04-23 株式会社日立製作所 Switch that provides path switching
US7366109B2 (en) 2003-10-29 2008-04-29 Nortel Networks Limited Virtual private networks within a packet network having a mesh topology
US7149214B2 (en) * 2003-11-04 2006-12-12 Cisco Technology, Inc. Dynamic unknown L2 flooding control with MAC limits
US7099544B2 (en) 2003-12-19 2006-08-29 Corning Incorporated High SBS threshold NZDS optical fiber
KR100733020B1 (en) * 2004-01-16 2007-06-29 니폰덴신뎅와 가부시키가이샤 Customer MAC Frame Forwarding Method, Edge Bridge, And Storage Medium Registering Program
US7774461B2 (en) 2004-02-18 2010-08-10 Fortinet, Inc. Mechanism for determining a congestion metric for a path in a network
US8923292B2 (en) * 2004-04-06 2014-12-30 Rockstar Consortium Us Lp Differential forwarding in address-based carrier networks
US20050220096A1 (en) 2004-04-06 2005-10-06 Robert Friskney Traffic engineering in frame-based carrier networks
US7433359B2 (en) 2004-05-28 2008-10-07 Fujitsu Limited Application of an Ethernet/MPLS half bridge to provide Ethernet multiplexing functions (EMF) in SONET network elements (NEs)
WO2006002230A2 (en) * 2004-06-23 2006-01-05 Nortel Networks Limited Backbone provider bridging networks
CN1309233C (en) * 2004-07-20 2007-04-04 华为技术有限公司 Method for supporting PPPoA on wideband switch-in equipment
US7463584B2 (en) 2004-08-03 2008-12-09 Nortel Networks Limited System and method for hub and spoke virtual private network
US7639674B2 (en) 2004-10-25 2009-12-29 Alcatel Lucent Internal load balancing in a data switch using distributed network processing
BRPI0519612A2 (en) * 2004-12-31 2009-02-25 British Telecomm switching apparatus in a communications network, methods of modifying switching apparatus positioned in a communications network, of switching packets via a communications network comprising a plurality of interconnected switching apparatus, of generating an end-to-end connection via a communications network comprising a plurality of switching apparatus preconfigured to support a connectionless communications protocol, to provide differentiated routing modes for packetized data, to configure switching apparatus to receive management and/or signaling information, network of communications, control plane processor, and, communication scheme to configure a network
US7782841B2 (en) 2005-01-05 2010-08-24 Cisco Technology, Inc. Method and system for transporting data using pseudowire circuits over a bridged network
US20060182118A1 (en) * 2005-02-01 2006-08-17 Hong Kong Applied Science and Technology Research Institute Company Limited System And Method For Efficient Traffic Processing
US7693144B2 (en) 2005-03-31 2010-04-06 Alcatel-Lucent Usa Inc. Method of providing VPLS service in a bridged (e.g. 802.1D) network of a service provider
US8199754B2 (en) * 2006-05-30 2012-06-12 Hewlett-Packard Development Company, L. P. Intrusion prevention system edge controller
IL177974A (en) * 2006-09-10 2011-06-30 Tejas Israel Ltd Method and system for relaying frames through an ethernet network and bridge therefor
US20080130417A1 (en) 2006-12-01 2008-06-05 Dilip Bhavnani Sensor clock
US7693164B1 (en) * 2007-02-05 2010-04-06 World Wide Packets, Inc. Configuring a packet tunnel network
CN101364926B (en) * 2007-08-08 2011-06-01 华为技术有限公司 Method and apparatus for network protection
US8325611B2 (en) * 2007-08-28 2012-12-04 Rockstar Bidco Lp Scaling OAM for point-to-point trunking
US8305884B2 (en) * 2007-09-14 2012-11-06 Ciena Corporation Systems and methods for a self-healing carrier ethernet topology
CN101960790B (en) * 2008-02-27 2014-07-30 艾利森电话股份有限公司 A system and method of demultiplexing provider backbone bridging traffic engineering instances
IL192140A0 (en) * 2008-06-12 2009-02-11 Ethos Networks Ltd Method and system for transparent lan services in a packet network
US8199753B2 (en) * 2009-06-05 2012-06-12 Juniper Networks, Inc. Forwarding frames in a computer network using shortest path bridging
US8358597B2 (en) * 2009-10-01 2013-01-22 Hei Tao Fung Method for building scalable Ethernet switch network and huge Ethernet switch
CA2781060C (en) * 2010-05-28 2016-03-08 Huawei Technologies Co., Ltd. Virtual layer 2 and mechanism to make it scalable
US8837281B2 (en) * 2010-09-10 2014-09-16 Futurewei Technologies, Inc. Use of partitions to reduce flooding and filtering database size requirements in large layer two networks
US8804720B1 (en) * 2010-12-22 2014-08-12 Juniper Networks, Inc. Pass-through multicast admission control signaling

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5485455A (en) * 1994-01-28 1996-01-16 Cabletron Systems, Inc. Network having secure fast packet switching and guaranteed quality of service
US5560038A (en) * 1994-07-22 1996-09-24 Network Peripherals, Inc. Apparatus for translating frames of data transferred between heterogeneous local area networks
US5959990A (en) * 1996-03-12 1999-09-28 Bay Networks, Inc. VLAN frame format
US6151324A (en) * 1996-06-03 2000-11-21 Cabletron Systems, Inc. Aggregation of mac data flows through pre-established path between ingress and egress switch to reduce number of number connections
US6449279B1 (en) * 1996-06-03 2002-09-10 Enterasys Networks, Inc. Aggregation of data flows over a pre-established path to reduce connections
US6249521B1 (en) * 1997-02-14 2001-06-19 Advanced Micro Devices, Inc. Method and apparatus for creating a port vector
US6181699B1 (en) * 1998-07-01 2001-01-30 National Semiconductor Corporation Apparatus and method of assigning VLAN tags
US6563832B1 (en) * 1998-11-30 2003-05-13 Cisco Technology, Inc. Token ring bridge distributed in a switched fabric
US6788681B1 (en) * 1999-03-16 2004-09-07 Nortel Networks Limited Virtual private networks and methods for their operation
US6515993B1 (en) * 1999-05-28 2003-02-04 Advanced Micro Devices, Inc. Method and apparatus for manipulating VLAN tags
US7079544B2 (en) * 2000-06-02 2006-07-18 Hitachi, Ltd. Apparatus and method for interworking between MPLS network and non-MPLS network
US7046680B1 (en) * 2000-11-28 2006-05-16 Mci, Inc. Network access system including a programmable access device having distributed service control
US6990106B2 (en) * 2001-03-19 2006-01-24 Alcatel Classification and tagging rules for switching nodes
US20020191250A1 (en) * 2001-06-01 2002-12-19 Graves Alan F. Communications network for a metropolitan area
US20030037163A1 (en) * 2001-08-15 2003-02-20 Atsushi Kitada Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider
US20030067928A1 (en) * 2001-09-24 2003-04-10 Gonda Rumi Sheryar Method for supporting ethernet MAC circuits
US20040223501A1 (en) * 2001-12-27 2004-11-11 Mackiewich Blair T. Method and apparatus for routing data frames
US20030142674A1 (en) * 2002-01-30 2003-07-31 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
US6789121B2 (en) * 2002-02-08 2004-09-07 Nortel Networks Limited Method of providing a virtual private network service through a shared network, and provider edge device for such network
US20030152075A1 (en) * 2002-02-14 2003-08-14 Hawthorne Austin J. Virtual local area network identifier translation in a packet-based network
US20030214962A1 (en) * 2002-05-15 2003-11-20 Mark Allaye-Chan Method and apparatus for bandwidth optimization in network ring topology
US7548541B2 (en) * 2002-06-04 2009-06-16 Alcatel-Lucent Usa Inc. Managing VLAN traffic in a multiport network node using customer-specific identifiers
US20030237002A1 (en) * 2002-06-25 2003-12-25 Hitachi, Ltd. Network node and communication system
US7492768B2 (en) * 2002-12-24 2009-02-17 Electronics And Telecommunications Research Institute System and method for VLAN configuration of E-PON, and recording medium with stored program thereof
US7558273B1 (en) * 2003-12-23 2009-07-07 Extreme Networks, Inc. Methods and systems for associating and translating virtual local area network (VLAN) tags

Cited By (332)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7359383B2 (en) * 2004-03-29 2008-04-15 Hewlett-Packard Development Company, L.P. Load balancing with mesh tagging
US8976793B2 (en) 2004-04-06 2015-03-10 Rockstar Consortium Us Lp Differential forwarding in address-based carrier networks
US20080279196A1 (en) * 2004-04-06 2008-11-13 Robert Friskney Differential Forwarding in Address-Based Carrier Networks
US20130176906A1 (en) * 2004-04-06 2013-07-11 Rockstar Bidco, LP Traffic engineering in frame-based carrier networks
US9356862B2 (en) 2004-04-06 2016-05-31 Rpx Clearinghouse Llc Differential forwarding in address-based carrier networks
US8923292B2 (en) 2004-04-06 2014-12-30 Rockstar Consortium Us Lp Differential forwarding in address-based carrier networks
US20070195832A1 (en) * 2004-04-09 2007-08-23 Utstarcom Telecom Co. Ltd. Method and system of signal transmission in base transceiver station based on remote radio head
US7822075B2 (en) * 2004-04-09 2010-10-26 Utstarcom Telecom Co., Ltd. Method and system of signal transmission in base transceiver station based on remote radio head
US20070160012A1 (en) * 2004-04-23 2007-07-12 Utstarcom Telecom Co., Ltd. Method and apparatus for multi-antenna signal transmission in rf long-distance wireless bs
US7817603B2 (en) * 2004-04-23 2010-10-19 Utstarcom Telecom Co., Ltd. Method and apparatus for multi-antenna signal transmission in RF long-distance wireless BS
US9118590B2 (en) 2004-07-02 2015-08-25 Rpx Clearinghouse Llc VLAN support of differentiated services
US20060007917A1 (en) * 2004-07-07 2006-01-12 Masahiro Saito Frame transfer method and edge switch
US8259713B2 (en) 2005-02-04 2012-09-04 Level 3 Communications, Llc Systems and methods for network routing in a multiple backbone network architecture
US8995451B2 (en) 2005-02-04 2015-03-31 Level 3 Communications, Llc Systems and methods for network routing in a multiple backbone network architecture
US20090141632A1 (en) * 2005-02-04 2009-06-04 Level 3 Communication, Llc Systems and methods for network routing in a multiple backbone network architecture
US20060215672A1 (en) * 2005-02-04 2006-09-28 Level 3 Communications, Inc. Ethernet-based systems and methods for improved network routing
US8526446B2 (en) 2005-02-04 2013-09-03 Level 3 Communications, Llc Ethernet-based systems and methods for improved network routing
US20070086429A1 (en) * 2005-02-04 2007-04-19 Level 3 Communications, Inc. Systems and Methods for Network Routing in a Multiple Backbone Network Architecture
US8064467B2 (en) 2005-02-04 2011-11-22 Level 3 Communications, Llc Systems and methods for network routing in a multiple backbone network architecture
US8498297B2 (en) 2005-08-26 2013-07-30 Rockstar Consortium Us Lp Forwarding table minimisation in ethernet switches
US20070047540A1 (en) * 2005-08-26 2007-03-01 Nigel Bragg Forwarding table minimisation in Ethernet switches
WO2007038856A1 (en) 2005-10-05 2007-04-12 Nortel Networks Limited Provider link state bridging
EP2800314A2 (en) 2005-10-05 2014-11-05 Nortel Networks Limited Provider link state bridging
US8553697B2 (en) 2005-10-05 2013-10-08 Rockstar Consortium Us Lp Provider backbone bridging—provider backbone transport internetworking
US20070076719A1 (en) * 2005-10-05 2007-04-05 Nortel Networks Limited Provider backbone bridging - provider backbone transport internetworking
WO2007038853A1 (en) * 2005-10-05 2007-04-12 Nortel Networks Limited Provider backbone bridging - provider backbone transport internetworking
US9036641B2 (en) 2005-10-05 2015-05-19 Rpx Clearinghouse Llc Provider backbone bridging—provider backbone transport internetworking
EP2424178A1 (en) 2005-10-05 2012-02-29 Nortel Networks Limited Provider link state bridging
US8369330B2 (en) * 2005-10-05 2013-02-05 Rockstar Consortium LP Provider backbone bridging—provider backbone transport internetworking
US20070098006A1 (en) * 2005-11-01 2007-05-03 Nortel Networks Limited Multilink trunking for encapsulated traffic
US7697528B2 (en) * 2005-11-01 2010-04-13 Nortel Networks Limited Multilink trunking for encapsulated traffic
WO2007087275A3 (en) * 2006-01-23 2007-12-21 Allied Telesis Inc Method and system for improving traffic distribution across a communication network
US20070177597A1 (en) * 2006-02-02 2007-08-02 Yu Ju Ethernet connection-based forwarding process
US20080151863A1 (en) * 2006-02-03 2008-06-26 Level 3 Communications Llc System and method for switching traffic through a network
US9426092B2 (en) 2006-02-03 2016-08-23 Level 3 Communications Llc System and method for switching traffic through a network
US20070211736A1 (en) * 2006-03-13 2007-09-13 Microsoft Corporatione Connecting multi-hop mesh networks usinc MAC Bridge
US8340106B2 (en) 2006-03-13 2012-12-25 Microsoft Corporation Connecting multi-hop mesh networks using MAC bridge
EP2005650A1 (en) * 2006-03-13 2008-12-24 Microsoft Corporation Connecting multi-hop mesh networks using mac bridge
EP2005650A4 (en) * 2006-03-13 2010-12-22 Microsoft Corp Connecting multi-hop mesh networks using mac bridge
US8274989B1 (en) 2006-03-31 2012-09-25 Rockstar Bidco, LP Point-to-multipoint (P2MP) resilience for GMPLS control of ethernet
US7729274B2 (en) 2006-03-31 2010-06-01 Ciena Corporation Smart ethernet mesh edge device
US8514878B1 (en) 2006-03-31 2013-08-20 Rockstar Consortium Us Lp Point-to-multipoint (P2MP) resilience for GMPLS control of ethernet
WO2007113645A3 (en) * 2006-03-31 2008-04-10 Gridpoint Systems Inc Smart ethernet edge networking system
US9900410B2 (en) 2006-05-01 2018-02-20 Nicira, Inc. Private ethernet overlay networks over a shared ethernet in a virtual environment
US20080095047A1 (en) * 2006-06-29 2008-04-24 Nortel Networks Limited Method and system for looping back traffic in qiq ethernet rings and 1:1 protected pbt trunks
US9319268B2 (en) 2006-06-29 2016-04-19 Rpx Clearinghouse Llc Q-in-Q Ethernet rings
US20100238813A1 (en) * 2006-06-29 2010-09-23 Nortel Networks Limited Q-in-Q Ethernet rings
US8085676B2 (en) 2006-06-29 2011-12-27 Nortel Networks Limited Method and system for looping back traffic in QIQ ethernet rings and 1:1 protected PBT trunks
EP2051450A4 (en) * 2006-08-09 2009-09-02 Huawei Tech Co Ltd Method and system for forwarding data between a plurality of provider ethernet networks
US20090141730A1 (en) * 2006-08-09 2009-06-04 Huawei Technologies Co., Ltd. Method and system for forwarding data between a plurality of provider ethernet networks
US7808997B2 (en) 2006-08-09 2010-10-05 Huawei Technologies Co., Ltd. Method and system for forwarding data between a plurality of provider Ethernet networks
EP2051450A1 (en) * 2006-08-09 2009-04-22 Huawei Technologies Co Ltd Method and system for forwarding data between a plurality of provider ethernet networks
US8149836B2 (en) * 2006-09-10 2012-04-03 Tejas Israel Ltd Method and system for relaying frames through an ethernet network and bridge therefor
US20080062994A1 (en) * 2006-09-10 2008-03-13 Ethos Networks Ltd Method and system for relaying frames through an ethernet network and bridge therefor
JP2010509825A (en) * 2006-11-02 2010-03-25 ノーテル・ネットワークス・リミテッド Traffic engineered path in an Ethernet network with link state protocol control
US20080107027A1 (en) * 2006-11-02 2008-05-08 Nortel Networks Limited Engineered paths in a link state protocol controlled Ethernet network
WO2008053252A1 (en) 2006-11-02 2008-05-08 Nortel Networks Limited Traffic engineered paths in a link state protocol controlled ethernet network
EP2750342A3 (en) * 2006-11-02 2014-08-13 Nortel Networks Limited Engineered paths in a link state protocol controlled ethernet network
EP2087657A2 (en) * 2006-11-30 2009-08-12 Level 3 Communications, LLC System and method for switching traffic through a network
WO2008067493A3 (en) * 2006-11-30 2008-07-17 Level 3 Communications Llc System and method for switching traffic through a network
EP2087657A4 (en) * 2006-11-30 2010-12-22 Level 3 Communications Llc System and method for switching traffic through a network
EP2153585A2 (en) * 2007-01-25 2010-02-17 Hammerhead Systems, Inc. Mapping pbt and pbb-te traffic to vpls and other services
EP2153585A4 (en) * 2007-01-25 2013-11-27 Brixham Solutions Ltd Mapping pbt and pbb-te traffic to vpls and other services
WO2008091637A2 (en) 2007-01-25 2008-07-31 Hammerhead Systems, Inc. Mapping pbt and pbb-te traffic to vpls and other services
US20080267080A1 (en) * 2007-04-27 2008-10-30 Futurewei Technologies, Inc. Fault Verification for an Unpaired Unidirectional Switched-Path
US8140654B2 (en) 2007-04-27 2012-03-20 Futurewei Technologies, Inc. Verifying management virtual local area network identifier provisioning consistency
US20080267072A1 (en) * 2007-04-27 2008-10-30 Futurewei Technologies, Inc. Data Communications Network for the Management of an Ethernet Transport Network
US7969888B2 (en) * 2007-04-27 2011-06-28 Futurewei Technologies, Inc. Data communications network for the management of an ethernet transport network
US20080270588A1 (en) * 2007-04-27 2008-10-30 Futurewei Technologies, Inc. Verifying Management Virtual Local Area Network Identifier Provisioning Consistency
US8320236B2 (en) * 2007-06-19 2012-11-27 Zte Corporation Method for processing ethernet ring message and an ethernet ring protection system using the method
US20100188968A1 (en) * 2007-06-19 2010-07-29 Zte Corporation Method for processing ether rig net message and an ether rig net protection system using the method
US8885634B2 (en) 2007-11-30 2014-11-11 Ciena Corporation Systems and methods for carrier ethernet using referential tables for forwarding decisions
EP2066081A1 (en) * 2007-11-30 2009-06-03 Ciena Corporation Flow control using referential tables in a carrier ethernet network
US20090141703A1 (en) * 2007-11-30 2009-06-04 Morteza Ghodrat Systems and methods for carrier ethernet using referential tables for forwarding decisions
WO2009073976A1 (en) 2007-12-13 2009-06-18 Nortel Networks Limited Method and system for looping back traffic in qiq ethernet rings and 1:1 protected pbt trunks
US8675519B2 (en) 2007-12-21 2014-03-18 Rockstar Consortium Us Lp Evolution of ethernet networks
US20090161669A1 (en) * 2007-12-21 2009-06-25 Nortel Netowrks Limited Evolution of Ethernet Networks
US20140146701A1 (en) * 2007-12-21 2014-05-29 Rockstar Consortium Us Lp Evolution of ethernet networks
US8005081B2 (en) * 2007-12-21 2011-08-23 Nortel Networks Limited Evolution of ethernet networks
EP2227879A4 (en) * 2007-12-31 2011-09-07 Nortel Networks Ltd Mpls p node replacement using link state protocol controlled ethernet network
EP2698951A1 (en) * 2007-12-31 2014-02-19 Nortel Networks Limited MPL P node replacement using a link state protocol controlled ethernet network
EP2227879A1 (en) * 2007-12-31 2010-09-15 Nortel Networks Limited Mpls p node replacement using link state protocol controlled ethernet network
US20090168780A1 (en) * 2007-12-31 2009-07-02 Nortel Networks Limited MPLS P node replacement using a link state protocol controlled ethernet network
US20090213854A1 (en) * 2008-02-21 2009-08-27 Telcordia Technologies, Inc. Efficient, fault-tolerant multicast networks via network coding
US8929365B2 (en) 2008-02-21 2015-01-06 Telcordia Technologies, Inc. Efficient, fault-tolerant multicast networks via network coding
WO2009105754A1 (en) * 2008-02-21 2009-08-27 Telcordia Technologies, Inc. Efficient, fault-tolerant multicast networks via network coding
CN102027714A (en) * 2008-05-16 2011-04-20 微软公司 Performing networking tasks based on destination networks
US8422513B2 (en) * 2008-05-23 2013-04-16 Nokia Siemens Networks Oy Providing station context and mobility in a wireless local area network having a split MAC architecture
US11757797B2 (en) 2008-05-23 2023-09-12 Vmware, Inc. Distributed virtual switch for virtualized computer systems
US11190463B2 (en) 2008-05-23 2021-11-30 Vmware, Inc. Distributed virtual switch for virtualized computer systems
US9276768B2 (en) 2008-05-23 2016-03-01 Nokia Solutions And Networks Oy Providing station context and mobility in a wireless local area network having a split MAC architecture
US20090290537A1 (en) * 2008-05-23 2009-11-26 Nokia Siemens Networks Providing station context and mobility in a wireless local area network having a split MAC architecture
US8767749B2 (en) * 2008-06-12 2014-07-01 Tejas Israel Ltd Method and system for transparent LAN services in a packet network
US20100008365A1 (en) * 2008-06-12 2010-01-14 Porat Hayim Method and system for transparent lan services in a packet network
US20100002711A1 (en) * 2008-07-02 2010-01-07 Hajime Aoki Communication system, network apparatus, communication recovery method for use therein, and program thereof
EP2141867A1 (en) * 2008-07-02 2010-01-06 Nec Corporation Communication system, network apparatus, communication recovery method for use therein, and program thereof
US8116331B2 (en) 2008-07-02 2012-02-14 Nec Corporation Communication system, network apparatus, communication recovery method for use therein, and program thereof
US8578048B2 (en) 2008-07-31 2013-11-05 Nectar Holdings, Inc. System and method for routing commands in a modularized software system
US20100030895A1 (en) * 2008-07-31 2010-02-04 Kiefer Matthew System for remotely managing and supporting a plurality of networks and systems
US20100030883A1 (en) * 2008-07-31 2010-02-04 Kiefer Matthew Method for overcoming address conflicts among disparate networks is a network management system
US20100030915A1 (en) * 2008-07-31 2010-02-04 Kiefer Matthew System and method for routing commands in a modularized software system
US20100030884A1 (en) * 2008-07-31 2010-02-04 Kiefer Matthew Publish and subscribe method for real-time event monitoring in a system for managing a plurality of disparate networks
US9100333B2 (en) 2008-07-31 2015-08-04 Nectar Holdings, Inc. System and method for routing commands in a modularized software system
US9160567B2 (en) 2008-11-26 2015-10-13 Huawei Technologies Co., Ltd. Method, apparatus, and system for establishing a virtual local area network connection
WO2010060373A1 (en) * 2008-11-26 2010-06-03 华为技术有限公司 Method, apparatus and system for establishing virtual local area network connection
US20110222439A1 (en) * 2008-11-26 2011-09-15 Huawei Technologies Co., Ltd. Method, apparatus, and system for establishing a virtual local area network connection
US9077563B2 (en) 2008-12-01 2015-07-07 Fujitsu Limited Switch for identifying extended group information of ports
US20100135307A1 (en) * 2008-12-01 2010-06-03 Fujitsu Limited Switch
WO2010115260A1 (en) * 2009-04-09 2010-10-14 Nortel Networks Limited Enabling an ethernet ring network to scalably support a hub-and-spoke connectivity model
US20100260196A1 (en) * 2009-04-09 2010-10-14 Nortel Networks Limited Enabling an Ethernet Ring Network to Scalably Support a Hub-And-Spoke Connectivity Model
US9203644B2 (en) 2009-04-09 2015-12-01 Ciena Corporation Enabling an Ethernet ring network to scalably support a hub-and-spoke connectivity model
US20110022721A1 (en) * 2009-07-24 2011-01-27 Wael William Diab Method and system for packetizing data for servicing traffic end-to-end
US8862768B2 (en) * 2009-07-24 2014-10-14 Broadcom Corporation Method and system for packetizing data for servicing traffic end-to-end
US10949246B2 (en) 2009-07-27 2021-03-16 Vmware, Inc. Automated network configuration of virtual machines in a virtual lab environment
US9952892B2 (en) 2009-07-27 2018-04-24 Nicira, Inc. Automated network configuration of virtual machines in a virtual lab environment
US9306910B2 (en) 2009-07-27 2016-04-05 Vmware, Inc. Private allocated networks over shared communications infrastructure
US9697032B2 (en) 2009-07-27 2017-07-04 Vmware, Inc. Automated network configuration of virtual machines in a virtual lab environment
US9888097B2 (en) 2009-09-30 2018-02-06 Nicira, Inc. Private allocated networks over shared communications infrastructure
US10757234B2 (en) 2009-09-30 2020-08-25 Nicira, Inc. Private allocated networks over shared communications infrastructure
US10291753B2 (en) 2009-09-30 2019-05-14 Nicira, Inc. Private allocated networks over shared communications infrastructure
US11917044B2 (en) 2009-09-30 2024-02-27 Nicira, Inc. Private allocated networks over shared communications infrastructure
US11533389B2 (en) 2009-09-30 2022-12-20 Nicira, Inc. Private allocated networks over shared communications infrastructure
US20110141891A1 (en) * 2009-12-10 2011-06-16 Verizon Patent And Licensing, Inc. Ldp extension for forwarding path congestion notification
US8693339B2 (en) * 2009-12-10 2014-04-08 Verizon Patent And Licensing Inc. LDP extension for forwarding path congestion notification
US20110142047A1 (en) * 2009-12-10 2011-06-16 Electronics and Telecommunications Rearch Institute Backbone edge switching apparatus and packet processing method of the backbone edge switching apparatus
US8582575B2 (en) * 2009-12-10 2013-11-12 Electronics And Telecommunications Research Institute Backbone edge switching apparatus and packet processing method of the backbone edge switching apparatus
US8755390B2 (en) * 2010-04-22 2014-06-17 International Business Machines Corporation Network data congestion management method
WO2011131740A1 (en) * 2010-04-22 2011-10-27 International Business Machines Corporation Network data congestion management system
US20130021910A1 (en) * 2010-04-22 2013-01-24 International Business Machines Corporation Network data congestion management method
GB2489376A (en) * 2010-04-22 2012-09-26 Ibm Network data congestion management system
US8767742B2 (en) * 2010-04-22 2014-07-01 International Business Machines Corporation Network data congestion management system
GB2489376B (en) * 2010-04-22 2016-10-26 Ibm Network data congestion management system
US20110261697A1 (en) * 2010-04-22 2011-10-27 International Business Machines Corporation Network data congestion management system
US10673703B2 (en) 2010-05-03 2020-06-02 Avago Technologies International Sales Pte. Limited Fabric switching
US9628336B2 (en) 2010-05-03 2017-04-18 Brocade Communications Systems, Inc. Virtual cluster switching
US9485148B2 (en) 2010-05-18 2016-11-01 Brocade Communications Systems, Inc. Fabric formation for virtual cluster switching
US9942173B2 (en) 2010-05-28 2018-04-10 Brocade Communications System Llc Distributed configuration management for virtual cluster switching
US9716672B2 (en) 2010-05-28 2017-07-25 Brocade Communications Systems, Inc. Distributed configuration management for virtual cluster switching
US9461840B2 (en) 2010-06-02 2016-10-04 Brocade Communications Systems, Inc. Port profile management for virtual cluster switching
US9769016B2 (en) 2010-06-07 2017-09-19 Brocade Communications Systems, Inc. Advanced link tracking for virtual cluster switching
US11757705B2 (en) 2010-06-07 2023-09-12 Avago Technologies International Sales Pte. Limited Advanced link tracking for virtual cluster switching
US10924333B2 (en) 2010-06-07 2021-02-16 Avago Technologies International Sales Pte. Limited Advanced link tracking for virtual cluster switching
US11438219B2 (en) 2010-06-07 2022-09-06 Avago Technologies International Sales Pte. Limited Advanced link tracking for virtual cluster switching
US9848040B2 (en) 2010-06-07 2017-12-19 Brocade Communications Systems, Inc. Name services for virtual cluster switching
US10419276B2 (en) 2010-06-07 2019-09-17 Avago Technologies International Sales Pte. Limited Advanced link tracking for virtual cluster switching
US9455935B2 (en) 2010-06-08 2016-09-27 Brocade Communications Systems, Inc. Remote port mirroring
US9143445B2 (en) 2010-06-08 2015-09-22 Brocade Communications Systems, Inc. Method and system for link aggregation across multiple switches
US9806906B2 (en) 2010-06-08 2017-10-31 Brocade Communications Systems, Inc. Flooding packets on a per-virtual-network basis
US9628293B2 (en) 2010-06-08 2017-04-18 Brocade Communications Systems, Inc. Network layer multicasting in trill networks
US9608833B2 (en) 2010-06-08 2017-03-28 Brocade Communications Systems, Inc. Supporting multiple multicast trees in trill networks
US9461911B2 (en) 2010-06-08 2016-10-04 Brocade Communications Systems, Inc. Virtual port grouping for virtual cluster switching
US11838395B2 (en) 2010-06-21 2023-12-05 Nicira, Inc. Private ethernet overlay networks over a shared ethernet in a virtual environment
US10951744B2 (en) 2010-06-21 2021-03-16 Nicira, Inc. Private ethernet overlay networks over a shared ethernet in a virtual environment
US9807031B2 (en) 2010-07-16 2017-10-31 Brocade Communications Systems, Inc. System and method for network configuration
US10348643B2 (en) 2010-07-16 2019-07-09 Avago Technologies International Sales Pte. Limited System and method for network configuration
US20180069727A1 (en) * 2010-09-10 2018-03-08 Extreme Networks, Inc. Access network dual path connectivity
US10594512B2 (en) * 2010-09-10 2020-03-17 Extreme Networks, Inc. Access network dual path connectivity
US20120076014A1 (en) * 2010-09-27 2012-03-29 Ciena Corporation Method and apparatus for traffic engineering in shortest path bridged networks
US9503360B2 (en) * 2010-09-27 2016-11-22 Ciena Corporation Method and apparatus for traffic engineering in shortest path bridged networks
US8787394B2 (en) 2011-02-01 2014-07-22 Ciena Corporation Separate ethernet forwarding and control plane systems and methods with interior gateway route reflector for a link state routing system
US9344346B2 (en) * 2011-02-19 2016-05-17 Deutsche Telekom Ag Looping MPLS paths at forwarding level for connectionless MPLS networks
US20130343204A1 (en) * 2011-02-19 2013-12-26 Deutsche Telekom Ag Looping mpls paths at forwarding level for connectionless mpls networks
US9178717B1 (en) * 2011-04-07 2015-11-03 Adtran, Inc. Systems and methods for enabling leaf isolation in a multi-node tree network
US9270572B2 (en) 2011-05-02 2016-02-23 Brocade Communications Systems Inc. Layer-3 support in TRILL networks
US9350564B2 (en) 2011-06-28 2016-05-24 Brocade Communications Systems, Inc. Spanning-tree based loop detection for an ethernet fabric switch
US9401861B2 (en) 2011-06-28 2016-07-26 Brocade Communications Systems, Inc. Scalable MAC address distribution in an Ethernet fabric switch
US9112772B2 (en) * 2011-06-29 2015-08-18 Nippon Telegraph And Telephone Corporation OLT and frame transfer control method
US20140112659A1 (en) * 2011-06-29 2014-04-24 Nippon Telegraph And Telephone Corporation Olt and frame transfer control method
US11804987B2 (en) 2011-08-17 2023-10-31 Nicira, Inc. Flow generation from second level controller to first level controller to managed switching element
US10027584B2 (en) 2011-08-17 2018-07-17 Nicira, Inc. Distributed logical L3 routing
US9350696B2 (en) 2011-08-17 2016-05-24 Nicira, Inc. Handling NAT in logical L3 routing
US10193708B2 (en) 2011-08-17 2019-01-29 Nicira, Inc. Multi-domain interconnect
US10931481B2 (en) 2011-08-17 2021-02-23 Nicira, Inc. Multi-domain interconnect
US11695695B2 (en) 2011-08-17 2023-07-04 Nicira, Inc. Logical L3 daemon
US9444651B2 (en) 2011-08-17 2016-09-13 Nicira, Inc. Flow generation from second level controller to first level controller to managed switching element
US10868761B2 (en) 2011-08-17 2020-12-15 Nicira, Inc. Logical L3 daemon
US9736085B2 (en) 2011-08-29 2017-08-15 Brocade Communications Systems, Inc. End-to end lossless Ethernet in Ethernet fabric
US20130094513A1 (en) * 2011-10-12 2013-04-18 Fujitsu Limited Relay apparatus and control method
US9712430B2 (en) * 2011-10-12 2017-07-18 Fujitsu Limited Relay apparatus and control method
US11669488B2 (en) 2011-10-25 2023-06-06 Nicira, Inc. Chassis controller
US10505856B2 (en) 2011-10-25 2019-12-10 Nicira, Inc. Chassis controller
US9954793B2 (en) 2011-10-25 2018-04-24 Nicira, Inc. Chassis controller
US20130103818A1 (en) * 2011-10-25 2013-04-25 Teemu Koponen Physical controller
US9602421B2 (en) 2011-10-25 2017-03-21 Nicira, Inc. Nesting transaction updates to minimize communication
US9154433B2 (en) * 2011-10-25 2015-10-06 Nicira, Inc. Physical controller
US9300593B2 (en) 2011-10-25 2016-03-29 Nicira, Inc. Scheduling distribution of logical forwarding plane data
US9288104B2 (en) 2011-10-25 2016-03-15 Nicira, Inc. Chassis controllers for converting universal flows
US9319337B2 (en) 2011-10-25 2016-04-19 Nicira, Inc. Universal physical control plane
US9306864B2 (en) 2011-10-25 2016-04-05 Nicira, Inc. Scheduling distribution of physical control plane data
US9319336B2 (en) 2011-10-25 2016-04-19 Nicira, Inc. Scheduling distribution of logical control plane data
US9319338B2 (en) 2011-10-25 2016-04-19 Nicira, Inc. Tunnel creation
US9699117B2 (en) 2011-11-08 2017-07-04 Brocade Communications Systems, Inc. Integrated fibre channel support in an ethernet fabric switch
US9450870B2 (en) 2011-11-10 2016-09-20 Brocade Communications Systems, Inc. System and method for flow management in software-defined networks
US10164883B2 (en) 2011-11-10 2018-12-25 Avago Technologies International Sales Pte. Limited System and method for flow management in software-defined networks
US9729387B2 (en) 2012-01-26 2017-08-08 Brocade Communications Systems, Inc. Link aggregation in software-defined networks
US9742693B2 (en) 2012-02-27 2017-08-22 Brocade Communications Systems, Inc. Dynamic service insertion in a fabric switch
US9887916B2 (en) 2012-03-22 2018-02-06 Brocade Communications Systems LLC Overlay tunnel in a fabric switch
US9154416B2 (en) 2012-03-22 2015-10-06 Brocade Communications Systems, Inc. Overlay tunnel in a fabric switch
US9350811B1 (en) 2012-04-04 2016-05-24 Nectar Services Corp. Load balancing networks and load balancing methods
US9020888B1 (en) 2012-04-04 2015-04-28 Nectar Services Corp. Data replicating systems and data replication methods
US10135676B2 (en) 2012-04-18 2018-11-20 Nicira, Inc. Using transactions to minimize churn in a distributed network control system
US10033579B2 (en) 2012-04-18 2018-07-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
US20130286921A1 (en) * 2012-04-30 2013-10-31 Gopal Agarwal System and method for mitigating multicast message duplication in a wireless network
US9356817B2 (en) * 2012-04-30 2016-05-31 Aruba Networks, Inc. System and method for mitigating multicast message duplication in a wireless network
US9374301B2 (en) 2012-05-18 2016-06-21 Brocade Communications Systems, Inc. Network feedback in software-defined networks
US9998365B2 (en) 2012-05-18 2018-06-12 Brocade Communications Systems, LLC Network feedback in software-defined networks
US10277464B2 (en) 2012-05-22 2019-04-30 Arris Enterprises Llc Client auto-configuration in a multi-switch link aggregation
US10454760B2 (en) 2012-05-23 2019-10-22 Avago Technologies International Sales Pte. Limited Layer-3 overlay gateways
US9602430B2 (en) 2012-08-21 2017-03-21 Brocade Communications Systems, Inc. Global VLANs for fabric switches
US9369301B2 (en) * 2012-09-07 2016-06-14 International Business Machines Corporation Overlay network capable of supporting storage area network (SAN) traffic
US20140348162A1 (en) * 2012-09-07 2014-11-27 International Business Machines Corporation Overlay network capable of supporting storage area network (san) traffic
US9544248B2 (en) 2012-09-07 2017-01-10 International Business Machines Corporation Overlay network capable of supporting storage area network (SAN) traffic
US8854955B2 (en) 2012-11-02 2014-10-07 Ciena Corporation Mesh restoration and bandwidth allocation systems and methods for shared risk connection groups
US8948055B2 (en) 2012-11-02 2015-02-03 Ciena Corporation Resilient interworking of shortest path bridging and Ethernet virtual private networks
US10075394B2 (en) 2012-11-16 2018-09-11 Brocade Communications Systems LLC Virtual link aggregations across multiple fabric switches
US9401872B2 (en) 2012-11-16 2016-07-26 Brocade Communications Systems, Inc. Virtual link aggregations across multiple fabric switches
US9338087B2 (en) 2012-12-21 2016-05-10 Ciena Corporation Source identification preservation in multiprotocol label switching networks
US9094337B2 (en) 2012-12-21 2015-07-28 Cieno Corporation Source identification preservation in multiprotocol label switching networks
US9350680B2 (en) 2013-01-11 2016-05-24 Brocade Communications Systems, Inc. Protection switching over a virtual link aggregation
US9548926B2 (en) 2013-01-11 2017-01-17 Brocade Communications Systems, Inc. Multicast traffic load balancing over virtual link aggregation
US9413691B2 (en) 2013-01-11 2016-08-09 Brocade Communications Systems, Inc. MAC address synchronization in a fabric switch
US9660939B2 (en) 2013-01-11 2017-05-23 Brocade Communications Systems, Inc. Protection switching over a virtual link aggregation
US9807017B2 (en) 2013-01-11 2017-10-31 Brocade Communications Systems, Inc. Multicast traffic load balancing over virtual link aggregation
US9774543B2 (en) 2013-01-11 2017-09-26 Brocade Communications Systems, Inc. MAC address synchronization in a fabric switch
US9565113B2 (en) 2013-01-15 2017-02-07 Brocade Communications Systems, Inc. Adaptive link aggregation and virtual link aggregation
US9565099B2 (en) 2013-03-01 2017-02-07 Brocade Communications Systems, Inc. Spanning tree in fabric switches
US10462049B2 (en) 2013-03-01 2019-10-29 Avago Technologies International Sales Pte. Limited Spanning tree in fabric switches
US10367736B2 (en) * 2013-03-15 2019-07-30 Cisco Technology, Inc. Extended tag networking
US9871676B2 (en) 2013-03-15 2018-01-16 Brocade Communications Systems LLC Scalable gateways for a fabric switch
US9401818B2 (en) 2013-03-15 2016-07-26 Brocade Communications Systems, Inc. Scalable gateways for a fabric switch
US9699001B2 (en) 2013-06-10 2017-07-04 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
US9565028B2 (en) 2013-06-10 2017-02-07 Brocade Communications Systems, Inc. Ingress switch multicast distribution in a fabric switch
EP3261301A1 (en) * 2013-06-10 2017-12-27 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
WO2014201040A1 (en) * 2013-06-10 2014-12-18 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
US10033640B2 (en) 2013-07-08 2018-07-24 Nicira, Inc. Hybrid packet processing
US10680948B2 (en) 2013-07-08 2020-06-09 Nicira, Inc. Hybrid packet processing
US9571386B2 (en) 2013-07-08 2017-02-14 Nicira, Inc. Hybrid packet processing
US11201808B2 (en) 2013-07-12 2021-12-14 Nicira, Inc. Tracing logical network packets through physical network
US10181993B2 (en) 2013-07-12 2019-01-15 Nicira, Inc. Tracing network packets through logical and physical networks
US9407580B2 (en) 2013-07-12 2016-08-02 Nicira, Inc. Maintaining data stored with a packet
US10778557B2 (en) 2013-07-12 2020-09-15 Nicira, Inc. Tracing network packets through logical and physical networks
US9806949B2 (en) 2013-09-06 2017-10-31 Brocade Communications Systems, Inc. Transparent interconnection of Ethernet fabric switches
US10382324B2 (en) 2013-09-15 2019-08-13 Nicira, Inc. Dynamically generating flows with wildcard fields
US9602398B2 (en) 2013-09-15 2017-03-21 Nicira, Inc. Dynamically generating flows with wildcard fields
US10498638B2 (en) 2013-09-15 2019-12-03 Nicira, Inc. Performing a multi-stage lookup to classify packets
CN104518967A (en) * 2013-09-30 2015-04-15 华为技术有限公司 Routing method, equipment and system
EP3043517A4 (en) * 2013-09-30 2016-07-13 Huawei Tech Co Ltd Routing method, device and system
US10491519B2 (en) 2013-09-30 2019-11-26 Huawei Technologies Co., Ltd. Routing method, device, and system
US9912612B2 (en) 2013-10-28 2018-03-06 Brocade Communications Systems LLC Extended ethernet fabric switches
US11811669B2 (en) 2013-12-09 2023-11-07 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US10666530B2 (en) 2013-12-09 2020-05-26 Nicira, Inc Detecting and handling large flows
US9967199B2 (en) 2013-12-09 2018-05-08 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US10158538B2 (en) 2013-12-09 2018-12-18 Nicira, Inc. Reporting elephant flows to a network controller
US11539630B2 (en) 2013-12-09 2022-12-27 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US9548924B2 (en) 2013-12-09 2017-01-17 Nicira, Inc. Detecting an elephant flow based on the size of a packet
US9838276B2 (en) 2013-12-09 2017-12-05 Nicira, Inc. Detecting an elephant flow based on the size of a packet
US10193771B2 (en) 2013-12-09 2019-01-29 Nicira, Inc. Detecting and handling elephant flows
US11095536B2 (en) 2013-12-09 2021-08-17 Nicira, Inc. Detecting and handling large flows
US10380019B2 (en) 2013-12-13 2019-08-13 Nicira, Inc. Dynamically adjusting the number of flows allowed in a flow table cache
US9569368B2 (en) 2013-12-13 2017-02-14 Nicira, Inc. Installing and managing flows in a flow table cache
US9996467B2 (en) 2013-12-13 2018-06-12 Nicira, Inc. Dynamically adjusting the number of flows allowed in a flow table cache
US9548873B2 (en) 2014-02-10 2017-01-17 Brocade Communications Systems, Inc. Virtual extensible LAN tunnel keepalives
US10355879B2 (en) 2014-02-10 2019-07-16 Avago Technologies International Sales Pte. Limited Virtual extensible LAN tunnel keepalives
US10581758B2 (en) 2014-03-19 2020-03-03 Avago Technologies International Sales Pte. Limited Distributed hot standby links for vLAG
US10476698B2 (en) 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
US11431639B2 (en) 2014-03-31 2022-08-30 Nicira, Inc. Caching of service decisions
US10659373B2 (en) 2014-03-31 2020-05-19 Nicira, Inc Processing packets according to hierarchy of flow entry storages
US9385954B2 (en) 2014-03-31 2016-07-05 Nicira, Inc. Hashing techniques for use in a network environment
US10193806B2 (en) 2014-03-31 2019-01-29 Nicira, Inc. Performing a finishing operation to improve the quality of a resulting hash
US10063473B2 (en) 2014-04-30 2018-08-28 Brocade Communications Systems LLC Method and system for facilitating switch virtualization in a network of interconnected switches
US9800471B2 (en) 2014-05-13 2017-10-24 Brocade Communications Systems, Inc. Network extension groups of global VLANs in a fabric switch
US10044568B2 (en) 2014-05-13 2018-08-07 Brocade Communications Systems LLC Network extension groups of global VLANs in a fabric switch
US9742881B2 (en) 2014-06-30 2017-08-22 Nicira, Inc. Network virtualization using just-in-time distributed capability for classification encoding
US10616108B2 (en) 2014-07-29 2020-04-07 Avago Technologies International Sales Pte. Limited Scalable MAC address virtualization
US9544219B2 (en) 2014-07-31 2017-01-10 Brocade Communications Systems, Inc. Global VLAN services
US9807007B2 (en) 2014-08-11 2017-10-31 Brocade Communications Systems, Inc. Progressive MAC address learning
US10284469B2 (en) 2014-08-11 2019-05-07 Avago Technologies International Sales Pte. Limited Progressive MAC address learning
US11178051B2 (en) 2014-09-30 2021-11-16 Vmware, Inc. Packet key parser for flow-based forwarding elements
US9524173B2 (en) 2014-10-09 2016-12-20 Brocade Communications Systems, Inc. Fast reboot for a switch
US11128550B2 (en) 2014-10-10 2021-09-21 Nicira, Inc. Logical network traffic analysis
US10469342B2 (en) 2014-10-10 2019-11-05 Nicira, Inc. Logical network traffic analysis
US9699029B2 (en) 2014-10-10 2017-07-04 Brocade Communications Systems, Inc. Distributed configuration management in a switch group
US9626255B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Online restoration of a switch snapshot
US9628407B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Multiple software versions in a switch group
US10003552B2 (en) 2015-01-05 2018-06-19 Brocade Communications Systems, Llc. Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches
US9942097B2 (en) 2015-01-05 2018-04-10 Brocade Communications Systems LLC Power management in a network of interconnected switches
US10038592B2 (en) 2015-03-17 2018-07-31 Brocade Communications Systems LLC Identifier assignment to a new switch in a switch group
US9807005B2 (en) 2015-03-17 2017-10-31 Brocade Communications Systems, Inc. Multi-fabric manager
US9967134B2 (en) 2015-04-06 2018-05-08 Nicira, Inc. Reduction of network churn based on differences in input state
US9923760B2 (en) 2015-04-06 2018-03-20 Nicira, Inc. Reduction of churn in a network control system
US10579406B2 (en) 2015-04-08 2020-03-03 Avago Technologies International Sales Pte. Limited Dynamic orchestration of overlay tunnels
US10069639B2 (en) 2015-07-28 2018-09-04 Ciena Corporation Multicast systems and methods for segment routing
US10686699B2 (en) 2015-07-28 2020-06-16 Ciena Corporation Multicast systems and methods for segment routing
US10439929B2 (en) 2015-07-31 2019-10-08 Avago Technologies International Sales Pte. Limited Graceful recovery of a multicast-enabled switch
US10171303B2 (en) 2015-09-16 2019-01-01 Avago Technologies International Sales Pte. Limited IP-based interconnection of switches with a logical chassis
US11288249B2 (en) 2015-09-30 2022-03-29 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US9912614B2 (en) 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller
US11601521B2 (en) 2016-04-29 2023-03-07 Nicira, Inc. Management of update queues for network controller
US10237090B2 (en) 2016-10-28 2019-03-19 Avago Technologies International Sales Pte. Limited Rule-based network identifier mapping
US10805239B2 (en) 2017-03-07 2020-10-13 Nicira, Inc. Visualization of path between logical network endpoints
US10200306B2 (en) 2017-03-07 2019-02-05 Nicira, Inc. Visualization of packet tracing operation results
US11336590B2 (en) 2017-03-07 2022-05-17 Nicira, Inc. Visualization of path between logical network endpoints
US11595345B2 (en) 2017-06-30 2023-02-28 Nicira, Inc. Assignment of unique physical network addresses for logical network addresses
US10637800B2 (en) 2017-06-30 2020-04-28 Nicira, Inc Replacement of logical network addresses with physical network addresses
US10681000B2 (en) 2017-06-30 2020-06-09 Nicira, Inc. Assignment of unique physical network addresses for logical network addresses
US10608887B2 (en) 2017-10-06 2020-03-31 Nicira, Inc. Using packet tracing tool to automatically execute packet capture operations
US10779342B2 (en) * 2017-11-27 2020-09-15 Cypress Semiconductor Corporation Load balance for dual interface automotive wi-fi controllers for P2P devices
CN111357386A (en) * 2017-11-27 2020-06-30 赛普拉斯半导体公司 Load balancing for dual interface automotive Wi-Fi controller for P2P devices
US20190166636A1 (en) * 2017-11-27 2019-05-30 Cypress Semiconductor Corporation Load balance for dual interface automotive wi-fi controllers for p2p devices
WO2019103823A1 (en) * 2017-11-27 2019-05-31 Cypress Semiconductor Corporation Load balance for dual interface automotive wi-fi controllers for p2p devices
US11909645B2 (en) 2018-02-05 2024-02-20 Ciena Corporation Segment routing traffic engineering based on link utilization
US10541923B2 (en) 2018-02-05 2020-01-21 Ciena Corporation Segment routing traffic engineering based on link utilization
US11552815B2 (en) 2018-09-13 2023-01-10 Telefonaktiebolaget Lm Ericsson (Publ) Method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices
US11012250B2 (en) 2018-09-13 2021-05-18 Telefonaktiebolaget Lm Ericsson (Publ) Method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices
US11750411B2 (en) 2018-09-13 2023-09-05 Telefonaktiebolaget Lm Ericsson (Publ) Method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices
WO2020052758A1 (en) * 2018-09-13 2020-03-19 Telefonaktiebolaget Lm Ericsson (Publ) A method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices.
AU2018441206B2 (en) * 2018-09-13 2022-10-13 Telefonaktiebolaget Lm Ericsson (Publ) A method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices.
US11870685B2 (en) 2019-03-01 2024-01-09 Nec Corporation Packet capsulation method and packet capsulation device
US11924080B2 (en) 2020-01-17 2024-03-05 VMware LLC Practical overlay network latency measurement in datacenter
US11196628B1 (en) 2020-07-29 2021-12-07 Vmware, Inc. Monitoring container clusters
US11570090B2 (en) 2020-07-29 2023-01-31 Vmware, Inc. Flow tracing operation in container cluster
US11558426B2 (en) 2020-07-29 2023-01-17 Vmware, Inc. Connection tracking for container cluster
US11736436B2 (en) 2020-12-31 2023-08-22 Vmware, Inc. Identifying routes with indirect addressing in a datacenter
US11848825B2 (en) 2021-01-08 2023-12-19 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11336533B1 (en) 2021-01-08 2022-05-17 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11687210B2 (en) 2021-07-05 2023-06-27 Vmware, Inc. Criteria-based expansion of group nodes in a network topology visualization
US11711278B2 (en) 2021-07-24 2023-07-25 Vmware, Inc. Visualization of flow trace operation across multiple sites
US11706109B2 (en) 2021-09-17 2023-07-18 Vmware, Inc. Performance of traffic monitoring actions
US11677645B2 (en) 2021-09-17 2023-06-13 Vmware, Inc. Traffic monitoring
US11855862B2 (en) 2021-09-17 2023-12-26 Vmware, Inc. Tagging packets for monitoring and analysis

Also Published As

Publication number Publication date
KR20070005654A (en) 2007-01-10
US20150016262A1 (en) 2015-01-15
KR101503629B1 (en) 2015-03-24
KR20130100217A (en) 2013-09-09
JP2013168998A (en) 2013-08-29
GB0506972D0 (en) 2005-05-11
EP1735961A1 (en) 2006-12-27
JP5106100B2 (en) 2012-12-26
GB2422508B (en) 2007-10-31
JP2013009437A (en) 2013-01-10
CN1938997B (en) 2010-10-13
JP2007532070A (en) 2007-11-08
EP1735961B1 (en) 2009-11-25
JP5544440B2 (en) 2014-07-09
KR20130100218A (en) 2013-09-09
CN1938997A (en) 2007-03-28
JP2013009438A (en) 2013-01-10
US9356862B2 (en) 2016-05-31
DE602005017882D1 (en) 2010-01-07
KR20130096328A (en) 2013-08-29
WO2005099183A1 (en) 2005-10-20
JP5238847B2 (en) 2013-07-17
ATE450104T1 (en) 2009-12-15
JP2011147195A (en) 2011-07-28
US20130176906A1 (en) 2013-07-11
CA2560702A1 (en) 2005-10-20
GB2422508A (en) 2006-07-26

Similar Documents

Publication Publication Date Title
US20050220096A1 (en) Traffic engineering in frame-based carrier networks
US8923292B2 (en) Differential forwarding in address-based carrier networks
US8422500B2 (en) VLAN support of differentiated services
US7619966B2 (en) Hybrid virtual private LAN extensions
US7260097B2 (en) Label control method and apparatus for virtual private LAN segment networks
EP1758320B1 (en) Forwarding table management in ethernet switch
US20080049621A1 (en) Connection-Oriented Communications Scheme For Connection-Less Communications Traffic
US20140010236A1 (en) Provider backbone bridging - provider backbone transport internetworking
GB2438767A (en) Identifying packets for forwarding through connections

Legal Events

Date Code Title Description
AS Assignment

Owner name: NORTEL NETWORKS LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ASHWOOD-SMITH, PETER;ALLAN, DAVID;REEL/FRAME:015184/0758

Effective date: 20040405

Owner name: NORTEL NETWORKS LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FRISKNEY, ROBERT;BRAGG, NIGEL;PARRY, SIMON;REEL/FRAME:015184/0706

Effective date: 20040405

AS Assignment

Owner name: ROCKSTAR BIDCO, LP, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTEL NETWORKS LIMITED;REEL/FRAME:027143/0717

Effective date: 20110729

AS Assignment

Owner name: ROCKSTAR CONSORTIUM US LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR BIDCO, LP;REEL/FRAME:029960/0201

Effective date: 20120509

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779

Effective date: 20150128